Penetration Testing Fundamentals

A Hands-On Guide to Reliable Security Audits

Nonfiction, Computers, Networking & Communications
Cover of the book Penetration Testing Fundamentals by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134854540
Publisher: Pearson Education Publication: March 6, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134854540
Publisher: Pearson Education
Publication: March 6, 2018
Imprint: Pearson IT Certification
Language: English

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

More books from Pearson Education

Cover of the book Microsoft Windows Vista Unleashed by William (Chuck) Easttom II
Cover of the book Flash CS4 Professional for Windows and Macintosh by William (Chuck) Easttom II
Cover of the book Silver Clouds, Dark Linings by William (Chuck) Easttom II
Cover of the book Confidence by William (Chuck) Easttom II
Cover of the book Rails Refactoring to Resources (Digital Short Cut) by William (Chuck) Easttom II
Cover of the book Why Great Leaders Don't Take Yes for an Answer by William (Chuck) Easttom II
Cover of the book iOS and macOS Performance Tuning by William (Chuck) Easttom II
Cover of the book Adobe After Effects CS5 Visual Effects and Compositing Studio Techniques by William (Chuck) Easttom II
Cover of the book Manage passwords, with 1Password by William (Chuck) Easttom II
Cover of the book Excel 2013 On Demand by William (Chuck) Easttom II
Cover of the book Adobe Photoshop Lightroom 2 Classroom in a Book by William (Chuck) Easttom II
Cover of the book MOS 2013 Study Guide for Microsoft PowerPoint by William (Chuck) Easttom II
Cover of the book My Google Nexus 7 and Nexus 10 by William (Chuck) Easttom II
Cover of the book The Role of Credit Default Swaps in Leveraged Finance Analysis by William (Chuck) Easttom II
Cover of the book Looking for the Right People by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy