Penetration Testing Fundamentals

A Hands-On Guide to Reliable Security Audits

Nonfiction, Computers, Networking & Communications
Cover of the book Penetration Testing Fundamentals by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134854540
Publisher: Pearson Education Publication: March 6, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134854540
Publisher: Pearson Education
Publication: March 6, 2018
Imprint: Pearson IT Certification
Language: English

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

More books from Pearson Education

Cover of the book Brilliant Productivity by William (Chuck) Easttom II
Cover of the book Exam Ref 70-412 Configuring Advanced Windows Server 2012 R2 Services (MCSA) by William (Chuck) Easttom II
Cover of the book Teach What You Know by William (Chuck) Easttom II
Cover of the book Exposure and Understanding the Histogram by William (Chuck) Easttom II
Cover of the book Apple Training Series by William (Chuck) Easttom II
Cover of the book Sweet Swan of Avon by William (Chuck) Easttom II
Cover of the book The Strategy Book: How to Think and Act Strategically to Deliver Outstanding Results by William (Chuck) Easttom II
Cover of the book Robot Programming by William (Chuck) Easttom II
Cover of the book Investing in Coal by William (Chuck) Easttom II
Cover of the book Make it Fly! by William (Chuck) Easttom II
Cover of the book Mail and Data Merges Using Word 2007 (Digital Short Cut) by William (Chuck) Easttom II
Cover of the book Brilliant Tactics to Pass Aptitude Tests by William (Chuck) Easttom II
Cover of the book Powerful PR Strategies for Success (Collection) by William (Chuck) Easttom II
Cover of the book How to Be Brilliant 4th edn by William (Chuck) Easttom II
Cover of the book Microsoft Outlook 2010 Inside Out by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy