Glen D Singh: 4 books

Book cover of CCNA Security 210-260 Certification Guide

CCNA Security 210-260 Certification Guide

Build your knowledge of network security and pass your CCNA Security exam (210-260)

by Vijay Anandh, Glen D. Singh, Michael Vinod
Language: English
Release Date: June 15, 2018

Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies Key Features Enhance your skills in network security by learning about Cisco’s device configuration and installation Unlock the practical aspects of CCNA security to secure...
Book cover of CompTIA Network+ Certification Guide

CompTIA Network+ Certification Guide

The ultimate guide to passing the N10-007 exam

by Glen D. Singh, Rishi Latchmepersad
Language: English
Release Date: December 19, 2018

This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols,...
Book cover of Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

by Glen D. Singh, Sean-Philip Oriyano
Language: English
Release Date: February 28, 2019

Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual...
Book cover of Learn Kali Linux 2018

Learn Kali Linux 2018

A hands-on guide for learning web application and network penetration testing using Kali Linux 2018.2

by Glen D. Singh, Joshua Crumbaugh
Language: English
Release Date: October 9, 2019

Leverage Kali Linux to learn the latest ethical hacking tools and techniques About This Book Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks...
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy