Cover art for Penetration Testing Fundamentals
Published
Pearson Education, November 2018
ISBN
9780789759375
Format
Softcover, 448 pages
Dimensions
23cm × 18cm × 2cm

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

Not in stock
Fast $7.95 flat-rate shipping!
Only pay $7.95 per order within Australia, including end-to-end parcel tracking.
100% encrypted and secure
We adhere to industry best practice and never store credit card details.
Talk to real people
Contact us seven days a week – our staff are here to help.

The perfect introduction to pen testing for all IT professionals and students

Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective.

Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned.

Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options.

LEARN HOW TO

Understand what pen testing is and how it's used

Meet modern standards for comprehensive and effective testing

Review cryptography essentials every pen tester must know

Perform reconnaissance with Nmap, Google searches, and ShodanHq

Use malware as part of your pen testing toolkit

Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

Pen test websites and web communication

Recognise SQL injection and cross-site scripting attacks

Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

Identify Linux vulnerabilities and password cracks

Use Kali Linux for advanced pen testing

Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

Systematically test your environment with Metasploit

Write or customize sophisticated Metasploit exploits

Related books