Penetration Testing Fundamentals

A Hands-On Guide to Reliable Security Audits

Nonfiction, Computers, Networking & Communications
Cover of the book Penetration Testing Fundamentals by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134854540
Publisher: Pearson Education Publication: March 6, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134854540
Publisher: Pearson Education
Publication: March 6, 2018
Imprint: Pearson IT Certification
Language: English

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

More books from Pearson Education

Cover of the book The Truth About Making All Your Employees Feel Like Your Only Employee by William (Chuck) Easttom II
Cover of the book Windows Server 2008 Active Directory Resource Kit by William (Chuck) Easttom II
Cover of the book Microsoft SQL Server 2014 Unleashed by William (Chuck) Easttom II
Cover of the book The Network Challenge (Chapter 6) by William (Chuck) Easttom II
Cover of the book Complex Networks by William (Chuck) Easttom II
Cover of the book Microsoft Office 2010 In Depth by William (Chuck) Easttom II
Cover of the book MariaDB Crash Course by William (Chuck) Easttom II
Cover of the book The Strategy Workout by William (Chuck) Easttom II
Cover of the book Microsoft Expression Web On Demand by William (Chuck) Easttom II
Cover of the book The Art of UNIX Programming by William (Chuck) Easttom II
Cover of the book Africa Rising by William (Chuck) Easttom II
Cover of the book Cisco Voice Gateways and Gatekeepers by William (Chuck) Easttom II
Cover of the book The Truth About Creating Brands People Love by William (Chuck) Easttom II
Cover of the book Easy Mac OS X Snow Leopard by William (Chuck) Easttom II
Cover of the book Finance: Fast Track to Success by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy