-
What’s it about?
Comprehensive guide to ethical hacking covering offensive and defensive techniques, from basic concepts to advanced topics like malware analysis, threat hunting, and cloud exploitation.
Shipping & Fee Details
| Price | CAD 68.49 |
| AmazonGlobal Shipping | CAD 10.89 |
| Estimated Import Charges | CAD 3.43 |
| Total | CAD 82.81 |
Book details
- ISBN-101801810087
- ISBN-13978-1801810081
- PublisherPackt Publishing
- Publication dateMay 17, 2024
- LanguageEnglish
- Dimensions7.5 x 1.05 x 9.25 inches
- Print length464 pages
Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting
Key Features
- Explore essential tools and techniques to ethically penetrate and safeguard digital environments
- Set up a malware lab and learn how to detect malicious code running on the network
- Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description
If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.
The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.
By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.
What you will learn
- Understand the core concepts and principles of ethical hacking
- Gain hands-on experience through dedicated labs
- Explore how attackers leverage computer systems in the digital landscape
- Discover essential defensive technologies to detect and mitigate cyber threats
- Master the use of scanning and enumeration tools
- Understand how to hunt and use search information to identify attacks
Who this book is for
Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.
Table of Contents
- Ethical Hacking Concepts
- Ethical Hacking Footprinting and Reconnaissance
- Ethical Hacking Scanning and Enumeration
- Ethical Hacking Vulnerability Assessment and Threat Modeling
- Hacking the Windows Operating System
- Hacking the Linux Operating System
- Ethical Hacking of Web Servers
- Hacking Databases
- Ethical Hacking Protocol Review
- Ethical Hacking for Malware Analysis
- Incident Response and Threat Hunting
- Social Engineering
- Ethical Hacking of the Internet of Things (IoT)
- Ethical Hacking in the Cloud
Review
“Shane Hartman has done a great job at sharing the ins and outs of ethical hacking in this book. He gives useful examples of many of the tools and techniques discussed in the book, and I think it makes the content he has shared easy to follow.
I feel someone with general knowledge of cybersecurity can take this book and feel comfortable learning the tools and skills that Shane shares.
This book scores an 'A' in my book as a valuable cybersecurity and ethical hacking resource for new and old people in cyber.”
Peter Bagley, Sr Cybersecurity Engineer (SCAMPI) at CACI International Inc.
“In this book, Shane has leveraged his real-world field experience to build a practice guide for new practitioners in a hands-on approach to ethical hacking – bravo!
Shane tinkers with new technologies as they come out, such as near-field communication (NFC) in his lab. Real penetration testers worth their salt must prove themselves with ‘trust but verify’ theories and approaches and, most importantly, validate, which is what this book is designed to do.
Shane introduces you to ethical hacking, from both offensive and defensive perspectives to both orient and enable readers to start their journey. He considers techniques, tactics, and procedures (TTPs) (MITRE ATT&CK) in everything he does, evidenced by how he thinks and walks readers through the training in this book.
This book helps readers apply ethical hacking programs and proactive security measures to reduce risk in their organization.”
Ken Dunham, CEO at 4D5A Security
“Ethical Hacking is a useful resource for learning cybersecurity concepts. The lab exercises at the end of each chapter are particularly helpful, as they provide an opportunity to apply the material in a hands-on way. These practical tasks complement the theoretical content well. The multiple-choice questions are also a nice touch, offering a way to review and assess understanding before moving forward. Overall, the book strikes a good balance between explanation and practice, making it a solid choice for those interested in ethical hacking.”
Daniel Graham, Author and Educator
About the Author
Shane Hartman, a seasoned professional with over 20 years in the computer security industry, currently serves as the Senior IR Consultant at TrustedSec. Holding a bachelor's degree in Business/e-business from the University of Phoenix and a master's in Digital Forensics from the University of Central Florida, Shane brings a wealth of academic and practical expertise to the field. With a notable CISSP certification and prior credentials, including MCSE, GREM, and GCIA, he has been actively engaged in the security discipline since 2005. In addition to Shane's extensive experience, he also teaches cybersecurity courses at the University of South Florida, including ethical hacking, digital forensics, and data analysis. This, coupled with a solid educational background, positions him as a leading authority in the dynamic realm of cybersecurity.
About the author
Follow authors to get new release updates, plus improved recommendations.Frequently bought together
Frequently bought together

You might also like
-  
-  
-  
Product information
| Publisher | Packt Publishing |
| Publication date | May 17, 2024 |
| Language | English |
| Print length | 464 pages |
| ISBN-10 | 1801810087 |
| ISBN-13 | 978-1801810081 |
| Item Weight | 1.74 pounds |
| Dimensions | 7.5 x 1.05 x 9.25 inches |
| Best Sellers Rank |
|
|---|---|
| Customer Reviews | 4.2 out of 5 stars 13Reviews |
Customers who bought this item also bought
You might also like
-  
-  
-  
-  
Related books
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- 5.0 out of 5 starsVerified PurchaseReseña de productoReviewed in the United States on December 9, 2025Format: PaperbackExcelente productor
Excelente productor
- 5.0 out of 5 starsVerified PurchaseGreat addition to your offensive security resource list!Reviewed in the United States on July 29, 2025Format: PaperbackOutstanding coverage of offensive security methodology and techniques
Outstanding coverage of offensive security methodology and techniques
- 5.0 out of 5 starsGuide Hands-On Learning from concepts, hacking tools, to defending with Extensive ResourcesReviewed in the United States on August 13, 2024Format: PaperbackThis book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt,...This book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt, which adds significant value to the learning experience. The quizzes provided throughout are reasonable, allowing folks to test their understanding of the material as they progress. However, while the reconnaissance section is informative, it could benefit from incorporating more modern techniques, such as using data brokers to gather information.
The book provides a broad yet shallow dive into various sub-topics, making it accessible but sometimes lacking in depth. The illustrations are straightforward, though some feel slightly outdated. While the vulnerability scanning tools discussed are useful, the book would benefit from updating these tools, particularly those that are not open-source or free. The section on incident response raises a valid point about the use of out-of-band communications, though the suggestion to use Signal may be legally questionable in cases where litigation is likely. Additionally, the threat-hunting diagram could be improved by including a lifecycle component for situations where no threat is detected, suggesting a report on the frequency of alerts before converting them into an active alert.
The discussion on social engineering defenses misses the crucial point that social media activity can make individuals more susceptible to attacks, although this might fall under the umbrella of awareness training. The content on AI’s role in social engineering feels lacking, particularly in the absence of exercises or tools. Moreover, more coverage of cloud security tools would have been beneficial. Overall, the book is reminiscent of the Certified Ethical Hacker (CEH) curriculum but more focused and concise, providing enough information to give folks a solid understanding without overwhelming them.
I would recommend this book for those whom from an understanding are between security + and CEH. If you already have many years of cyber security experience taking CEH, SANS Classes, etc this will be known content.
This book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt, which adds significant value to the learning experience. The quizzes provided throughout are reasonable, allowing folks to test their understanding of the material as they progress. However, while the reconnaissance section is informative, it could benefit from incorporating more modern techniques, such as using data brokers to gather information.
The book provides a broad yet shallow dive into various sub-topics, making it accessible but sometimes lacking in depth. The illustrations are straightforward, though some feel slightly outdated. While the vulnerability scanning tools discussed are useful, the book would benefit from updating these tools, particularly those that are not open-source or free. The section on incident response raises a valid point about the use of out-of-band communications, though the suggestion to use Signal may be legally questionable in cases where litigation is likely. Additionally, the threat-hunting diagram could be improved by including a lifecycle component for situations where no threat is detected, suggesting a report on the frequency of alerts before converting them into an active alert.
The discussion on social engineering defenses misses the crucial point that social media activity can make individuals more susceptible to attacks, although this might fall under the umbrella of awareness training. The content on AI’s role in social engineering feels lacking, particularly in the absence of exercises or tools. Moreover, more coverage of cloud security tools would have been beneficial. Overall, the book is reminiscent of the Certified Ethical Hacker (CEH) curriculum but more focused and concise, providing enough information to give folks a solid understanding without overwhelming them.
I would recommend this book for those whom from an understanding are between security + and CEH. If you already have many years of cyber security experience taking CEH, SANS Classes, etc this will be known content.
- 5.0 out of 5 starsLearn Ethical Hacking... hands-on.Reviewed in the United States on July 9, 2024Format: PaperbackReally liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well,...Really liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well, and does it also hands-on. I'll keep this book near me, for sure. The best part - other than hacking, there is a considerable amount of the book related to defending yourself - so, maybe you will not start hacking, but maybe someone will hack you - learn how to protect yourself from this book. Did I mention labs?! I really liked doing the labs, and in practice testing what I learned.
Really liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well, and does it also hands-on. I'll keep this book near me, for sure. The best part - other than hacking, there is a considerable amount of the book related to defending yourself - so, maybe you will not start hacking, but maybe someone will hack you - learn how to protect yourself from this book. Did I mention labs?! I really liked doing the labs, and in practice testing what I learned.
- 5.0 out of 5 starsGood resource to start learningReviewed in the United States on August 10, 2024Format: PaperbackAfter getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and...After getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and seasoned professionals in the industry.
After getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and seasoned professionals in the industry.
- 5.0 out of 5 starsA Great Resource for the Ethical Hacking ProfessionalReviewed in the United States on August 7, 2024Format: PaperbackThis book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking....This book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking. You will enjoy this book from start to finish!
This book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking. You will enjoy this book from start to finish!
- 5.0 out of 5 starsWow!Reviewed in the United States on May 28, 2024Format: PaperbackSo I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker...So I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker progress their skills. Nice Job!
So I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker progress their skills. Nice Job!
How customer reviews and ratings work
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.Learn more how customers reviews work on Amazon











