Penetration Testing Fundamentals

A Hands-On Guide to Reliable Security Audits

Nonfiction, Computers, Networking & Communications
Cover of the book Penetration Testing Fundamentals by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134854540
Publisher: Pearson Education Publication: March 6, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134854540
Publisher: Pearson Education
Publication: March 6, 2018
Imprint: Pearson IT Certification
Language: English

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The perfect introduction to pen testing for all IT professionals and students

·         Clearly explains key concepts, terminology, challenges, tools, and skills

·         Covers the latest penetration testing standards from NSA, PCI, and NIST

Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

LEARN HOW TO

·         Understand what pen testing is and how it’s used

·         Meet modern standards for comprehensive and effective testing

·         Review cryptography essentials every pen tester must know

·         Perform reconnaissance with Nmap, Google searches, and ShodanHq

·         Use malware as part of your pen testing toolkit

·         Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

·         Pen test websites and web communication

·         Recognize SQL injection and cross-site scripting attacks

·         Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

·         Identify Linux vulnerabilities and password cracks

·         Use Kali Linux for advanced pen testing

·         Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

·         Systematically test your environment with Metasploit

·         Write or customize sophisticated Metasploit exploits

 

More books from Pearson Education

Cover of the book MOS 2016 Study Guide for Microsoft Access by William (Chuck) Easttom II
Cover of the book Essentials of Chemical Reaction Engineering by William (Chuck) Easttom II
Cover of the book Practical Applications in Digital Signal Processing by William (Chuck) Easttom II
Cover of the book Chemical Process Equipment Design by William (Chuck) Easttom II
Cover of the book Marketing for Entrepreneurs by William (Chuck) Easttom II
Cover of the book Homebuying Tips on Credit and Credit Scores by William (Chuck) Easttom II
Cover of the book Hamlet: York Notes Advanced by William (Chuck) Easttom II
Cover of the book Learning JavaScript by William (Chuck) Easttom II
Cover of the book Visual Poetry by William (Chuck) Easttom II
Cover of the book Advanced Game Design by William (Chuck) Easttom II
Cover of the book The Coming China Wars by William (Chuck) Easttom II
Cover of the book Microsoft Windows 7 Your Way by William (Chuck) Easttom II
Cover of the book Microsoft XNA Game Studio 4.0 by William (Chuck) Easttom II
Cover of the book Upgrading and Repairing PCs by William (Chuck) Easttom II
Cover of the book Adobe Premiere Pro CC Classroom in a Book (2018 release) by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy