did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789758415

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

by
  • ISBN13:

    9780789758415

  • ISBN10:

    0789758415

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2018-03-01
  • Publisher: Pearson IT Certification
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99
We're Sorry.
No Options Available at This Time.

Summary

Thousands of organizations are recognizing the crucial role of penetration testing in protecting their networks and digital assets. In some industries, “pentesting” is now an absolute requirement. This is the first systematic guidebook for the growing number of security professionals and students who want to master the discipline and techniques of penetration testing.

 

Leading security expert, researcher, instructor, and author Chuck Easttom II has brought together all the essential knowledge in a single comprehensive guide that covers the entire penetration testing lifecycle. Easttom integrates concepts, terminology, challenges, and theory, and walks you through every step, from planning to effective post-test reporting. He presents a start-to-finish sample project relying on free open source tools, as well as quizzes, labs, and review sections throughout. Penetration Testing Fundamentals is also the only book to cover pentesting standards from NSA, PCI, and NIST.

 

You don’t need any prior pentesting knowledge to succeed with this practical guide: by the time you’re finished, you’ll have all the skills you need to conduct reliable, professional penetration tests.

Table of Contents

1. Introduction to Penetration Testing
2. Standards
3. Cryptography
4. Reconnaissance
5. Malware
6. Hacking Windows
7. Web Hacking
8. Vulnerability Scanning
9. Introduction To Linux
10. Linux Hacking
11. Introduction to Kali Linux
12. General Techniques
13. Introduction to Metasploit
14. More with Metasploit
15. Introduction to Scripting with Ruby
16. Write Your Own Metasploit Exploits with Ruby
17. General Hacking Knowledge
18. Additional Pen Testing Topics
19. A Sample Pen Test Project

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program