Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition : Achieve the Gold Standard in Penetration Testing with Kali Using This Masterpiece, Now in Its Third Edition!
ISBN: 9781785886065
Platform/Publisher: Ebook Central / Packt Publishing, Limited
Digital rights: Users: Unlimited; Printing: Limited; Download: 7 Days at a Time
Subjects: Computer Science/ IT;

No detailed description available for "Kali Linux 2 - Assuring Security by Penetration Testing".


Johansen Gerard :

Gerard Johansen is an incident response professional with over 15 years' experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cyber crime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance. Gerard is a graduate of Norwich University's Master of Science in Information Assurance program and a certified information systems security professional. He is currently employed as a senior incident response consultant with a large technology company, focusing on incident detection, response, and threat intelligence integration.Allen Lee :

Lee Allen is the associate director at Ohio State University. He specializes in information security, penetration testing, security research, task automation, risk management, data analysis, and 3D application development.Heriyanto Tedi :

Tedi Heriyanto currently works as an information security analyst at a Fortune 500 company. He has experience of designing secure network architectures, deploying and managing enterprise-wide security systems, developing information security policies and procedures, performing various network, web, and mobile application penetration testing, and giving information security training. In his spare time, he deepens his knowledge and skills in information fields.Ali Shakeel :

Shakeel Ali is a senior cybersecurity consultant at a global Fortune 500 organization. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, attack simulations, SOC/CSIRC facilitation, incident response, and forensic projects that he carries out in day-to-day operations. He is an independent researcher who writes various articles and white papers to provide insights into threat intelligence, and also provides constant security support to various businesses globally.

hidden image for function call