We're still working on our article for Infiltration. Please check back soon for more information.
Find a path to becoming a Infiltration. Learn more at:
OpenCourser.com/topic/a3eeby/infiltratio
Reading list
We've selected 13 books
that we think will supplement your
learning. Use these to
develop background knowledge, enrich your coursework, and gain a
deeper understanding of the topics covered in
Infiltration.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, decryption, authentication, and digital signatures. Stallings leading expert in cryptography and provides a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of security engineering, covering topics such as risk assessment, threat modeling, and security controls. Anderson leading expert in security engineering and provides insights into the latest trends and best practices.
Provides a comprehensive overview of the internal workings of the Windows operating system. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of computer forensics, covering topics such as evidence collection, analysis, and reporting. The author leading expert in the field and provides a clear and concise explanation of the underlying concepts.
Introduces social engineering, a technique used by attackers to manipulate people into revealing sensitive information or taking actions that benefit the attacker. Hadnagy, a leading expert in social engineering, provides practical advice on how to protect yourself from these attacks.
Provides a comprehensive overview of social engineering, phishing, and other techniques used by attackers to gain access to systems and information. The authors are leading experts in the field and provide practical advice on how to protect yourself from these attacks.
Provides a comprehensive overview of security assessment, covering topics such as threat modeling, vulnerability assessment, and penetration testing. The authors are leading experts in the field and provide practical advice on how to build security into software development.
Provides a comprehensive overview of memory forensics, a technique used to investigate computer systems by analyzing the contents of memory. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of malware analysis, covering topics such as malware detection, prevention, and response. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
Provides a comprehensive overview of network security, covering topics such as network protocols, cryptography, firewalls, and intrusion detection systems. The authors provide a hands-on approach to learning about network security through exercises and labs.
Focuses on the human element of security and how attackers can exploit it to gain access to systems and information. Mitnick, a world-renowned hacker, provides insights into the techniques used by attackers and how defenders can protect themselves.
Provides a practical guide to penetration testing, a process used to identify vulnerabilities in computer systems. The authors cover topics such as reconnaissance, scanning, exploitation, and reporting. This book is suitable for both beginners and experienced penetration testers.
Provides a comprehensive overview of shellcoding, a technique used by attackers to gain control of a computer system. The authors are leading experts in the field and provide a clear and concise explanation of the underlying concepts.
For more information about how these books relate to this course, visit:
OpenCourser.com/topic/a3eeby/infiltratio