£41.99

Packt Publishing Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Price data last checked 12 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 79 days • 79 data points (No recent data available)

Historical
Generating forecast...
£41.99 £41.61 £41.69 £41.77 £41.86 £41.94 £42.03 23 January 2026 11 February 2026 03 March 2026 22 March 2026 11 April 2026

Price Distribution

Price distribution over 79 days • 1 price levels

Days at Price
79 days 0 20 40 59 79 £42 Days at Price

Price Analysis

Most common price: £42 (79 days, 100.0%)

Price range: £42 - £42

Price levels: 1 different prices over 79 days

Description

Plug the gaps in your network's infrastructure with resilient network security models Key Features: - Develop a cost-effective and end-to-end vulnerability management program - Explore best practices for vulnerability scanning and risk assessment - Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book Description: Digitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: - Network Scanning Cookbook by Sairam Jetty - Network Vulnerability Assessment by Sagar Rahalkar What You Will Learn: - Explore various standards and frameworks for vulnerability assessments and penetration testing - Gain insight into vulnerability scoring and reporting - Discover the importance of patching and security hardening - Develop metrics to measure the success of a vulnerability management program - Perform configuration audits for various platforms using Nessus - Write custom Nessus and Nmap scripts on your own - Install and configure Nmap and Nessus in your network infrastructure - Perform host discovery to identify network devices Who this book is for: This Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
26 March 2019
Listed Since
27 March 2019

Barcode

No barcode data available

Similar Products You Might Like

Defensive Security Handbook: Best Practices for Securing Infrastructure
98% match

Defensive Security Handbook: Best Practices for Securing Infrastructure

O'Reilly

£37.76 13 Apr 2026
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
98% match

Cybersecurity Essentials: Practical Tools for Today's Digital Defenders

Apress

£38.87 19 Apr 2026
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
98% match

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Apress

£49.60 14 Apr 2026
Conducting Network Penetration and Espionage in a Global Environment
98% match

Conducting Network Penetration and Espionage in a Global Environment

CRC Press

£57.56 05 Apr 2026
Building an Effective Security Program
98% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
GFI Network Security and PCI Compliance Power Tools
98% match

GFI Network Security and PCI Compliance Power Tools

Syngress

£40.99 13 Apr 2026
Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
98% match

Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)

Springer

£147.91 04 Apr 2026
Malware Analysis Techniques: Tricks for the triage of adversarial software
98% match

Malware Analysis Techniques: Tricks for the triage of adversarial software

Packt Publishing

£39.99 09 Apr 2026
National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)
98% match

National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)

Springer

£77.73 18 Apr 2026
A Practical Guide to Security Assessments
98% match

A Practical Guide to Security Assessments

Routledge

£121.46 21 Apr 2026
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
98% match

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)

CRC Press

£45.85 11 Apr 2026
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
98% match

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Packt Publishing

£41.50 13 Apr 2026
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)
98% match

Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)

Springer

£76.14 12 Apr 2026
Web Penetration Testing with Kali Linux
98% match

Web Penetration Testing with Kali Linux

Packt Publishing

£41.99 15 Apr 2026
OSINT 101: The Ultimate Open Source intelligence Handbook
98% match

OSINT 101: The Ultimate Open Source intelligence Handbook

£40.14 12 Mar 2026
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Security, Audit and Leadership Series)
98% match

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Security, Audit and Leadership Series)

CRC Press

£93.00 31 Mar 2026
Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)
98% match

Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)

Springer

£120.83 14 Apr 2026
Risk Assessment and Countermeasures for Cybersecurity
98% match

Risk Assessment and Countermeasures for Cybersecurity

£330.44 11 Apr 2026
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)
98% match

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)

Springer

£111.36 01 Apr 2026
Responsive Security: Be Ready to Be Secure
98% match

Responsive Security: Be Ready to Be Secure

CRC Press

£157.32 06 Apr 2026
Security on the Web: 83 (Advances in Computers): Volume 83
98% match

Security on the Web: 83 (Advances in Computers): Volume 83

Academic Press

£102.12 11 Apr 2026
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls
97% match

Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls

Apress

£49.99 18 Apr 2026
El libro del Hacker. Edición 2022 (TÍTULOS ESPECIALES)
97% match

El libro del Hacker. Edición 2022 (TÍTULOS ESPECIALES)

Anaya Multimedia

£41.89 09 Apr 2026
Mastering Metasploit: Write and Implement Sophisticated Attack Vectors in Metasploit Using a Completely Hands-on Approach
97% match

Mastering Metasploit: Write and Implement Sophisticated Attack Vectors in Metasploit Using a Completely Hands-on Approach

Packt Publishing

£41.99 17 Apr 2026