Penetration Testing Fundamentals

Penetration Testing Fundamentals
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
A Hands-On Guide to Reliable Security Audits
 EPUB
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 63,35 €

Jetzt 63,34 €* EPUB

Artikel-Nr:
9780134854540
Veröffentl:
2018
Einband:
EPUB
Seiten:
448
Autor:
William Easttom II
eBook Typ:
EPUB
eBook Format:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students * Clearly explains key concepts, terminology, challenges, tools, and skills * Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO * Understand what pen testing is and how it's used * Meet modern standards for comprehensive and effective testing * Review cryptography essentials every pen tester must know * Perform reconnaissance with Nmap, Google searches, and ShodanHq * Use malware as part of your pen testing toolkit * Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry * Pen test websites and web communication * Recognize SQL injection and cross-site scripting attacks * Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA * Identify Linux vulnerabilities and password cracks * Use Kali Linux for advanced pen testing * Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering * Systematically test your environment with Metasploit * Write or customize sophisticated Metasploit exploits
Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students * Clearly explains key concepts, terminology, challenges, tools, and skills * Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO * Understand what pen testing is and how it's used * Meet modern standards for comprehensive and effective testing * Review cryptography essentials every pen tester must know * Perform reconnaissance with Nmap, Google searches, and ShodanHq * Use malware as part of your pen testing toolkit * Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry * Pen test websites and web communication * Recognize SQL injection and cross-site scripting attacks * Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA * Identify Linux vulnerabilities and password cracks * Use Kali Linux for advanced pen testing * Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering * Systematically test your environment with Metasploit * Write or customize sophisticated Metasploit exploits

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.