Network vulnerability assessment : identify security loopholes in your network's infrastructure /
Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham, UK :
Packt Publishing,
2018.
|
Subjects: | |
Online Access: | CONNECT CONNECT |