We may earn an affiliate commission when you visit our partners.

Infiltration

Save

We're still working on our article for Infiltration. Please check back soon for more information.

Path to Infiltration

Take the first step.
We've curated one courses to help you on your path to Infiltration. Use these to develop your skills, build background knowledge, and put what you learn to practice.
Sorted from most relevant to least relevant:

Share

Help others find this page about Infiltration: by sharing it with your friends and followers:

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Infiltration.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, decryption, authentication, and digital signatures. Stallings leading expert in cryptography and provides a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of the internal workings of the Windows operating system. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of computer forensics, covering topics such as evidence collection, analysis, and reporting. The author leading expert in the field and provides a clear and concise explanation of the underlying concepts.
Introduces social engineering, a technique used by attackers to manipulate people into revealing sensitive information or taking actions that benefit the attacker. Hadnagy, a leading expert in social engineering, provides practical advice on how to protect yourself from these attacks.
Provides a comprehensive overview of social engineering, phishing, and other techniques used by attackers to gain access to systems and information. The authors are leading experts in the field and provide practical advice on how to protect yourself from these attacks.
Provides a comprehensive overview of security assessment, covering topics such as threat modeling, vulnerability assessment, and penetration testing. The authors are leading experts in the field and provide practical advice on how to build security into software development.
Provides a comprehensive overview of memory forensics, a technique used to investigate computer systems by analyzing the contents of memory. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of malware analysis, covering topics such as malware detection, prevention, and response. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of network security, covering topics such as network protocols, cryptography, firewalls, and intrusion detection systems. The authors provide a hands-on approach to learning about network security through exercises and labs.
Focuses on the human element of security and how attackers can exploit it to gain access to systems and information. Mitnick, a world-renowned hacker, provides insights into the techniques used by attackers and how defenders can protect themselves.
Provides a practical guide to penetration testing, a process used to identify vulnerabilities in computer systems. The authors cover topics such as reconnaissance, scanning, exploitation, and reporting. This book is suitable for both beginners and experienced penetration testers.
Provides a comprehensive overview of shellcoding, a technique used by attackers to gain control of a computer system. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser