Penetration Testing Fundamentals

A Hands-On Guide to Reliable Security Audits

Nonfiction, Computers, Networking & Communications
Cover of the book Penetration Testing Fundamentals by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134854540
Publisher: Pearson Education Publication: March 6, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134854540
Publisher: Pearson Education
Publication: March 6, 2018
Imprint: Pearson IT Certification
Language: English

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

More books from Pearson Education

Cover of the book Essential Silverlight 3 by William (Chuck) Easttom II
Cover of the book Level 2: Kidnapped by William (Chuck) Easttom II
Cover of the book The Truth About Winning at Work (Collection) by William (Chuck) Easttom II
Cover of the book Microsoft Office Professional 2013 for Touch Devices Plain & Simple by William (Chuck) Easttom II
Cover of the book Easy Windows 8.1 by William (Chuck) Easttom II
Cover of the book Adobe Lightroom and Photoshop for Photographers Classroom in a Book by William (Chuck) Easttom II
Cover of the book Creating a Web Site in Dreamweaver CS3 by William (Chuck) Easttom II
Cover of the book CCNP ONT Portable Command Guide by William (Chuck) Easttom II
Cover of the book Exam Ref 70-417 Upgrading from Windows Server 2008 to Windows Server 2012 R2 (MCSA) by William (Chuck) Easttom II
Cover of the book CompTIA Project+ Cert Guide by William (Chuck) Easttom II
Cover of the book Agile Estimating and Planning by William (Chuck) Easttom II
Cover of the book The Joy of UX by William (Chuck) Easttom II
Cover of the book How to Be Brilliant at Public Speaking 2e by William (Chuck) Easttom II
Cover of the book The Social Factor by William (Chuck) Easttom II
Cover of the book Microsoft Project 2010 In Depth by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy