Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
Your form is submitting...
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
Email Address is required. 'Email Address' must contain at least 0 characters 'Email Address' cannot exceed 0 characters Please enter a valid Email Address
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Country is required. 'Country' must contain at least 0 characters 'Country' cannot exceed 0 characters Please enter a valid Country
Cengage, at your service! How can we best meet your needs? is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?

Hands-On Ethical Hacking and Network Defense, 4th Edition

Rob S. Wilson, Michael T. Simpson, Nicholas Antill

  • {{checkPublicationMessage('Published', '2022-03-22T00:00:00+0000')}}
Starting At £41.59 See pricing and ISBN options
Hands-On Ethical Hacking and Network Defense 4th Edition by Rob S. Wilson/Michael T. Simpson/Nicholas Antill

Overview

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, helps learners gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explain the importance of ethical hacking in protecting corporate and government data before offering an in-depth guide to performing security testing. Thoroughly updated, the 4th edition covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings many of the concepts together in a penetration testing exercise and report. In addition, live virtual machine labs and auto-graded quizzes in the online learning platform provide interactive activities to prepare future network security professionals.

Rob S. Wilson

Robert S. Wilson is the cybersecurity curriculum coordinator and a cybersecurity instructor for Willis College (Canada’s oldest career college). Rob created Willis College’s Software Development and Cybersecurity Analyst (CSA) programs. Willis College’s CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (he worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity.

Michael T. Simpson

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle® database and UNIX® administrator, and held multiple cyber security positions.

Nicholas Antill

Nicholas Antill is a seasoned information security professional with over 10 years of specialized cyber security experience. He specializes in penetration testing, proactive security controls, and network defense. In addition to earning a B.S. from the University of Pittsburgh and an M.S. from Capella University, he holds many industry certifications, including the OSCP, GWAPT, GPEN, GCIH, CISA, CISSP, and GCFE. Nicholas started his career at a small grocery chain in Pittsburgh, where he developed a fascination with network attack and defense techniques. He worked in support of the U.S. Department of Justice and the U.S. Department of Defense before returning to the private sector, where he currently manages the ethical hacking program at a large U.S. financial institution.
  • Extensively updated for today's cybersecurity landscape, the 4th edition features the latest computer security tools, a discussion of new vulnerabilities and exploits, and coverage of innovative methods to protect modern networks.
  • Updated information on computer crime laws at the state and federal level include recent changes in penalties for illegal computer hacking.
  • Web application hacking sections are now enhanced with coverage of newer attacks as well as new web application testing methodologies.
  • In addition to detailed coverage of network security, wireless technology and their impact on wide area networks, this edition equips readers with a practical grounding in ethical and legal issues relevant to penetration testing.
  • Improved module review questions now include in-depth analysis questions that require research and reporting on key security topics.
  • HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE concludes with a Final Project requiring students to apply key concepts and tools by performing a penetration testing and reporting exercise on a collection of virtual machines.
  • The discussion of smartphone security provides valuable insights and guidance on the current mobile security landscape in a time when smartphone usage and mobile networking continue to grow.
  • Web application hacking sections are now enhanced with coverage of newer attacks as well as new web application testing methodologies.
  • Extensive learning tools -- including Activities, Review Questions, Hands-On Projects and Case Projects -- reinforce key concepts while giving students valuable practice applying what they have learned.
  • Numerous case studies guide students through all aspects of network planning, including interconnectivity issues, physical transmission options, voice and data integration, WAN transport methods and ATM technologies.
Module 1. Ethical Hacking Overview.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.

Textbook Only Options

Traditional eBook and Print Options

{{collapseContainerClosed['detail_0'] ? 'Show More' : 'Show Less'}}

  • ISBN-10: 035771007X
  • ISBN-13: 9780357710074
  • RETAIL £41.59

  • ISBN-10: 0357509757
  • ISBN-13: 9780357509753
  • RETAIL £51.99