<p><b>Leading cybersecurity expert Matthew Hickey and team teach you offensive hacking techniques!</b> <p>Cybersecurity threats are everywhere. The best way to identify the real-world risks to your computer networks and your dataand to defend against attacksis to think like malicious hackers and understand their methods. <p><i>Hands on Hacking</i> is a crash-course on the techniques hackers use to attack and compromise organizations of all sizes with an emphasis on the practical elements of hacking. Virtual labs have been put together exclusively for this book, that readers can download for honing and testing their skills. Based on Hacker House's training courses, this book covers ethics and law, open-source intelligence gathering, domain name systems, email services, web servers, virtual private networks, file storage, database servers and web applications. We cover Linux, UNIX and the Microsoft Windows operating systems including tools and exploits used for hacking into them. <p>Requiring no previous experience in computer hacking and only an entry level understanding of computers and networking, this book will help you to develop the curiosity, creativity, and determination that every hacker possesses, whether you're a business leader, or someone getting started as an ethical hacker. You will examine a typical company's infrastructure, explore how to access its servers and data, probe for flaws, and search for vulnerabilities. You'll run exploits which have been developed by individual hackers and government agencies, learn how they work, and use them to hack into the accompanying lab. Finally, you'll learn how to report your findings and suggest remedial action to your client or team. <p>Written by information security expert Matthew Hickey, who has an established history of discovering critical security vulnerabilities and teaching others to do the same, <i>Hands on Hacking</i> helps you: <ul> <li>Learn theoretical <i>and</i> practical aspects of hacking</li> <li>Understand what hackers can do to and for a company while creating a positive hacker-aware culture in your organization</li> <li>Create Purple Teams a mix of attackers and defenders that work together to identify and solve security issues</li> <li>Understand protocols that power networks and the Internet, learn and understand their flaws</li> <li>Hack into Linux, Unix and Microsoft Windows operating systems</li> <li>Assess web applications for critical vulnerabilities and exploit them</li> <li>Develop the mindset of an ethical hacker and learn the processes of professional hacking</li> </ul>