Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

ISBN-13: 978-1801810081, ISBN-10: 1801810087
Loading Images...
Double-tap to zoom
CAD 68.49
CAD 14.32 Shipping & Import Charges to Canada Details

Shipping & Fee Details

Price CAD 68.49
AmazonGlobal Shipping CAD 10.89
Estimated Import Charges CAD 3.43
Total CAD 82.81

Delivery December 29 - 31
In Stock
CAD CAD 68.49 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
CAD CAD 68.49
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Shipper / Seller
Amazon.com
Amazon.com
Shipper / Seller
Amazon.com
Returns
FREE refund/replacement until Jan 31, 2026
FREE refund/replacement until Jan 31, 2026
For the 2025 holiday season, eligible items purchased between November 1 and December 31, 2025 can be returned until January 31, 2026.
Read full return policy
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
{"mobile_buybox_group_1":[{"displayPrice":"CAD 68.49","priceAmount":68.49,"currencySymbol":"CAD","integerValue":"68","decimalSeparator":".","fractionalValue":"49","symbolPosition":"left","hasSpace":true,"showFractionalPartIfEmpty":true,"offerListingId":"UG0CCcdx3%2F1Y1ZhO%2FOkuzqVy1zGGtmExtiHPgqOzKZ0ipkoukxdMTDl%2Be10YmKP6wQ5dDD%2BGqZ1gznLlnKwarfjkSRsQYVAzKpHjmAhMtBTBYOjf7RzNAbLuLkgVlRZ1rlPZfYdPoKcBlzTRbWMVsA%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Book details

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting

Key Features

  • Explore essential tools and techniques to ethically penetrate and safeguard digital environments
  • Set up a malware lab and learn how to detect malicious code running on the network
  • Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan
  • Purchase of the print or Kindle book includes a free PDF eBook

Book Description

If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.

The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.

By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.

What you will learn

  • Understand the core concepts and principles of ethical hacking
  • Gain hands-on experience through dedicated labs
  • Explore how attackers leverage computer systems in the digital landscape
  • Discover essential defensive technologies to detect and mitigate cyber threats
  • Master the use of scanning and enumeration tools
  • Understand how to hunt and use search information to identify attacks

Who this book is for

Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.

Table of Contents

  1. Ethical Hacking Concepts
  2. Ethical Hacking Footprinting and Reconnaissance
  3. Ethical Hacking Scanning and Enumeration
  4. Ethical Hacking Vulnerability Assessment and Threat Modeling
  5. Hacking the Windows Operating System
  6. Hacking the Linux Operating System
  7. Ethical Hacking of Web Servers
  8. Hacking Databases
  9. Ethical Hacking Protocol Review
  10. Ethical Hacking for Malware Analysis
  11. Incident Response and Threat Hunting
  12. Social Engineering
  13. Ethical Hacking of the Internet of Things (IoT)
  14. Ethical Hacking in the Cloud

Review

“Shane Hartman has done a great job at sharing the ins and outs of ethical hacking in this book. He gives useful examples of many of the tools and techniques discussed in the book, and I think it makes the content he has shared easy to follow.

I feel someone with general knowledge of cybersecurity can take this book and feel comfortable learning the tools and skills that Shane shares.

This book scores an 'A' in my book as a valuable cybersecurity and ethical hacking resource for new and old people in cyber.”

Peter Bagley, Sr Cybersecurity Engineer (SCAMPI) at CACI International Inc.



“In this book, Shane has leveraged his real-world field experience to build a practice guide for new practitioners in a hands-on approach to ethical hacking – bravo!

Shane tinkers with new technologies as they come out, such as near-field communication (NFC) in his lab. Real penetration testers worth their salt must prove themselves with ‘trust but verify’ theories and approaches and, most importantly, validate, which is what this book is designed to do.

Shane introduces you to ethical hacking, from both offensive and defensive perspectives to both orient and enable readers to start their journey. He considers techniques, tactics, and procedures (TTPs) (MITRE ATT&CK) in everything he does, evidenced by how he thinks and walks readers through the training in this book.

This book helps readers apply ethical hacking programs and proactive security measures to reduce risk in their organization.”

Ken Dunham, CEO at 4D5A Security



“Ethical Hacking is a useful resource for learning cybersecurity concepts. The lab exercises at the end of each chapter are particularly helpful, as they provide an opportunity to apply the material in a hands-on way. These practical tasks complement the theoretical content well. The multiple-choice questions are also a nice touch, offering a way to review and assess understanding before moving forward. Overall, the book strikes a good balance between explanation and practice, making it a solid choice for those interested in ethical hacking.”

Daniel Graham, Author and Educator

About the Author

Shane Hartman, a seasoned professional with over 20 years in the computer security industry, currently serves as the Senior IR Consultant at TrustedSec. Holding a bachelor's degree in Business/e-business from the University of Phoenix and a master's in Digital Forensics from the University of Central Florida, Shane brings a wealth of academic and practical expertise to the field. With a notable CISSP certification and prior credentials, including MCSE, GREM, and GCIA, he has been actively engaged in the security discipline since 2005. In addition to Shane's extensive experience, he also teaches cybersecurity courses at the University of South Florida, including ethical hacking, digital forensics, and data analysis. This, coupled with a solid educational background, positions him as a leading authority in the dynamic realm of cybersecurity.

About the author

Follow authors to get new release updates, plus improved recommendations.

Frequently bought together

+
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
+
Hacking and Security: The Comprehensive Guide to Ethical Hacking, Penetration Testing, and Cybersecurity (Rheinwerk Computing

Frequently bought together

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.
Total price: $00
Details
Added to Cart
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Product information

Publisher Packt Publishing
Publication date May 17, 2024
Language ‎English
Print length 464 pages
ISBN-10 1801810087
ISBN-13 978-1801810081
Item Weight ‎1.74 pounds
Dimensions 7.5 x 1.05 x 9.25 inches
Best Sellers Rank
Customer Reviews 4.2 out of 5 stars 13Reviews

Top reviews from the United States

  • 5.0 out of 5 starsVerified Purchase
    Reseña de producto
    Reviewed in the United States on December 9, 2025
    Format: Paperback
    Excelente productor
    Excelente productor
  • 4.0 out of 5 starsVerified Purchase
    Ok with
    Reviewed in the United States on May 19, 2025
    Format: Paperback
    Kool book
    Kool book
  • 5.0 out of 5 starsVerified Purchase
    Great addition to your offensive security resource list!
    Reviewed in the United States on July 29, 2025
    Format: Paperback
    Outstanding coverage of offensive security methodology and techniques
    Outstanding coverage of offensive security methodology and techniques
  • 5.0 out of 5 stars
    Guide Hands-On Learning from concepts, hacking tools, to defending with Extensive Resources
    Reviewed in the United States on August 13, 2024
    Format: Paperback
    This book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt,...
    This book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt, which adds significant value to the learning experience. The quizzes provided throughout are reasonable, allowing folks to test their understanding of the material as they progress. However, while the reconnaissance section is informative, it could benefit from incorporating more modern techniques, such as using data brokers to gather information.

    The book provides a broad yet shallow dive into various sub-topics, making it accessible but sometimes lacking in depth. The illustrations are straightforward, though some feel slightly outdated. While the vulnerability scanning tools discussed are useful, the book would benefit from updating these tools, particularly those that are not open-source or free. The section on incident response raises a valid point about the use of out-of-band communications, though the suggestion to use Signal may be legally questionable in cases where litigation is likely. Additionally, the threat-hunting diagram could be improved by including a lifecycle component for situations where no threat is detected, suggesting a report on the frequency of alerts before converting them into an active alert.

    The discussion on social engineering defenses misses the crucial point that social media activity can make individuals more susceptible to attacks, although this might fall under the umbrella of awareness training. The content on AI’s role in social engineering feels lacking, particularly in the absence of exercises or tools. Moreover, more coverage of cloud security tools would have been beneficial. Overall, the book is reminiscent of the Certified Ethical Hacker (CEH) curriculum but more focused and concise, providing enough information to give folks a solid understanding without overwhelming them.

    I would recommend this book for those whom from an understanding are between security + and CEH. If you already have many years of cyber security experience taking CEH, SANS Classes, etc this will be known content.
    This book offers a well-rounded overview of cybersecurity principles with hacking and defending of some of the hacks. One of the standout features is the inclusion of live links to example code files, along with access to an extensive library of books and videos from Packt, which adds significant value to the learning experience. The quizzes provided throughout are reasonable, allowing folks to test their understanding of the material as they progress. However, while the reconnaissance section is informative, it could benefit from incorporating more modern techniques, such as using data brokers to gather information.

    The book provides a broad yet shallow dive into various sub-topics, making it accessible but sometimes lacking in depth. The illustrations are straightforward, though some feel slightly outdated. While the vulnerability scanning tools discussed are useful, the book would benefit from updating these tools, particularly those that are not open-source or free. The section on incident response raises a valid point about the use of out-of-band communications, though the suggestion to use Signal may be legally questionable in cases where litigation is likely. Additionally, the threat-hunting diagram could be improved by including a lifecycle component for situations where no threat is detected, suggesting a report on the frequency of alerts before converting them into an active alert.

    The discussion on social engineering defenses misses the crucial point that social media activity can make individuals more susceptible to attacks, although this might fall under the umbrella of awareness training. The content on AI’s role in social engineering feels lacking, particularly in the absence of exercises or tools. Moreover, more coverage of cloud security tools would have been beneficial. Overall, the book is reminiscent of the Certified Ethical Hacker (CEH) curriculum but more focused and concise, providing enough information to give folks a solid understanding without overwhelming them.

    I would recommend this book for those whom from an understanding are between security + and CEH. If you already have many years of cyber security experience taking CEH, SANS Classes, etc this will be known content.
  • 5.0 out of 5 stars
    Learn Ethical Hacking... hands-on.
    Reviewed in the United States on July 9, 2024
    Format: Paperback
    Really liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well,...
    Really liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well, and does it also hands-on. I'll keep this book near me, for sure. The best part - other than hacking, there is a considerable amount of the book related to defending yourself - so, maybe you will not start hacking, but maybe someone will hack you - learn how to protect yourself from this book. Did I mention labs?! I really liked doing the labs, and in practice testing what I learned.
    Really liked the hands-on, and to-the-point approach of this book! If (ethical) hacking is something you wanna learn about, or become better at, maybe you should take a look at this book. It explores everything that should be important for (ethical) hacking, does it well, and does it also hands-on. I'll keep this book near me, for sure. The best part - other than hacking, there is a considerable amount of the book related to defending yourself - so, maybe you will not start hacking, but maybe someone will hack you - learn how to protect yourself from this book. Did I mention labs?! I really liked doing the labs, and in practice testing what I learned.
  • 5.0 out of 5 stars
    Good resource to start learning
    Reviewed in the United States on August 10, 2024
    Format: Paperback
    After getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and...
    After getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and seasoned professionals in the industry.
    After getting my hands on a printed copy and going through all the chapters, I can definitely say its a good resource to have when starting your journey in ethical hacking. The books covers a lot of essential topics and practical exercises to assist both aspiring and seasoned professionals in the industry.
  • 5.0 out of 5 stars
    A Great Resource for the Ethical Hacking Professional
    Reviewed in the United States on August 7, 2024
    Format: Paperback
    This book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking....
    This book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking. You will enjoy this book from start to finish!
    This book does a wonderful job of laying the foundation for the everyday cybersecurity professional. The author does a tremendous job of explaining the core concepts of Ethical Hacking. This book is a great resource for learning, applying, and understanding Ethical Hacking. You will enjoy this book from start to finish!
  • 5.0 out of 5 stars
    Wow!
    Reviewed in the United States on May 28, 2024
    Format: Paperback
    So I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker...
    So I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker progress their skills. Nice Job!
    So I absolutely recommend this to be added to your day to day library. Lets be real, there are so many general Ethical Hacking books out there, but this one finally isnt just for beginning tactics, it goes into detail where its needed to help the hungry ethical hacker progress their skills. Nice Job!

How customer reviews and ratings work

Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.Learn more how customers reviews work on Amazon