Cybersecurity & Ethical Hacking
Learn cybersecurity from the attacker's perspective — covering reconnaissance, vulnerability assessment, exploitation, web application security, penetration testing methodology, and security compliance.
13 chapters across 2 books
Introduction to Ethical Hacking
Ethical Hacking
Setting Up Your Hacking Lab
Ethical Hacking
Scanning and Enumeration
Ethical Hacking
Exploitation Fundamentals
Ethical Hacking
Web Application Security
Ethical Hacking
Injection Attacks
Ethical Hacking
Social Engineering Attacks
Ethical Hacking
Cloud Security Testing
Ethical Hacking
AI and Machine Learning Security
Ethical Hacking
Red Team Operations
Ethical Hacking
Bug Bounty Hunting
Ethical Hacking
Penetration Testing Methodology
Ethical Hacking
Cybersecurity and AI
AI Ethics
Explore More Topics
Browse other topic collections
Machine Learning 16 chapters Python for Data Science 8 chapters Neural Networks & Deep Learning 9 chapters Probability & Statistics 10 chapters Sports Betting Analytics 16 chapters Natural Language Processing (NLP) 12 chapters Data Visualization 9 chapters Sports Analytics 14 chapters Predictive Modeling & Forecasting 17 chapters Computer Vision 8 chapters AI-Assisted Software Development 12 chapters AI Agents & Autonomous Systems 6 chapters Software Engineering Best Practices 11 chapters AI Ethics & Governance 14 chapters Applied Psychology 12 chapters Python for Business 10 chapters Working with AI Tools 12 chapters