The perfect introduction to pen testing for all IT professionals and students
· Clearly explains key concepts, terminology, challenges, tools, and skills
· Covers the latest penetration testing standards from NSA, PCI, and NIST
Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.
Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.
You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.
Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.
LEARN HOW TO
· Understand what pen testing is and how it’s used
· Meet modern standards for comprehensive and effective testing
· Review cryptography essentials every pen tester must know
· Perform reconnaissance with Nmap, Google searches, and ShodanHq
· Use malware as part of your pen testing toolkit
· Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry
· Pen test websites and web communication
· Recognize SQL injection and cross-site scripting attacks
· Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA
· Identify Linux vulnerabilities and password cracks
· Use Kali Linux for advanced pen testing
· Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering
· Systematically test your environment with Metasploit
· Write or customize sophisticated Metasploit exploits
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Chuck Easttom has been in the IT industry for well over 25 years and cybersecurity for over 15. He has over 40 industry certifications, and has authored 24 other books. He is also an inventor with 13 patents. Chuck is a frequent speaker at various security conferences including Defcon, ISC2 Security Congress, Secure World, and many others. He also has authored a number of papers on security-related topics including malware development, penetration testing, and hacking techniques. He also has hands-on experience consulting on cyber security issues and conducting penetration tests.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 3,52 per la spedizione in U.S.A.
Destinazione, tempi e costiGRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Codice articolo ABTA-5430
Quantità: 2 disponibili
Da: Basi6 International, Irving, TX, U.S.A.
Condizione: Brand New. New.SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Codice articolo ABEJUNE24-282599
Quantità: 15 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
Paperback. Condizione: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 002150396U
Quantità: 3 disponibili
Da: Goodbooks Company, Springdale, AR, U.S.A.
Condizione: acceptable. This copy may contain significant wear, including bending, writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose or missing pages and may not include access codes or CD. Codice articolo GBV.0789759373.A
Quantità: 1 disponibili
Da: TextbookRush, Grandview Heights, OH, U.S.A.
Condizione: Very Good. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Codice articolo 52310020
Quantità: 1 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Codice articolo 30108501-5
Quantità: 3 disponibili
Da: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condizione: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Codice articolo 9780789759375
Quantità: 1 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 30108501
Quantità: 6 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: As New. Unread book in perfect condition. Codice articolo 30108501
Quantità: 6 disponibili
Da: CitiRetail, Stevenage, Regno Unito
Paperback. Condizione: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Codice articolo 9780789759375
Quantità: 1 disponibili