Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

· Pearson IT Certification
4.2
8 reviews
Ebook
448
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

The perfect introduction to pen testing for all IT professionals and students


· Clearly explains key concepts, terminology, challenges, tools, and skills

· Covers the latest penetration testing standards from NSA, PCI, and NIST


Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.


Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.


You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.


Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.


LEARN HOW TO

· Understand what pen testing is and how it’s used

· Meet modern standards for comprehensive and effective testing

· Review cryptography essentials every pen tester must know

· Perform reconnaissance with Nmap, Google searches, and ShodanHq

· Use malware as part of your pen testing toolkit

· Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

· Pen test websites and web communication

· Recognize SQL injection and cross-site scripting attacks

· Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

· Identify Linux vulnerabilities and password cracks

· Use Kali Linux for advanced pen testing

· Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

· Systematically test your environment with Metasploit

· Write or customize sophisticated Metasploit exploits

Ratings and reviews

4.2
8 reviews
Anil Das
January 11, 2021
AAA
Did you find this helpful?

About the author

Chuck Easttom has been in the IT industry for well over 25 years and cybersecurity for over 15. He has over 40 industry certifications, and has authored 24 other books. He is also an inventor with 13 patents. Chuck is a frequent speaker at various security conferences including Defcon, ISC2 Security Congress, Secure World, and many others. He also has authored a number of papers on security-related topics including malware development, penetration testing, and hacking techniques. He also has hands-on experience consulting on cyber security issues and conducting penetration tests.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.