Book Image

Cybersecurity Attacks (Red Team Activity) [Video]

By : Sergii Nesterenko
Book Image

Cybersecurity Attacks (Red Team Activity) [Video]

By: Sergii Nesterenko

Overview of this book

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them. All the resource files are added to the GitHub repository at https://github.com/packtpublishing/cybersecurity-attacks-red-team-activity-
Table of Contents (4 chapters)
Chapter 1
Building Our Lab
Content Locked
Section 5
Getting Acquainted with Terminal Commands
In this video, we are going to learn how to use Kali terminal and its commands necessary to know for this course. - Have a look at terminal and how it functions - Find out a bunch of terminal commands and useful cheats - Know how to run, install, and delete programs with terminal commands