Penetration Testing Basics (eBook)

A Quick-Start Guide to Breaking into Systems

(Autor)

eBook Download: PDF
2016 | 1st ed.
XV, 115 Seiten
Apress (Verlag)
978-1-4842-1857-0 (ISBN)

Lese- und Medienproben

Penetration Testing Basics - Ric Messier
Systemvoraussetzungen
46,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
Penetration Testing Basics explains:

  • How to identify security vulnerabilities
  • How to use some of the top security tools in order to identify holes
  • How to read reports from testing tools
  • Common vulnerability types and attacks
  • Common web-based attacks and exposures as well as recommendations for               closing those holes





Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College.

Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies.

An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security. 
 

Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. What You Will LearnIdentify security vulnerabilitiesUse some of the top security tools to identify holesRead reports from testing toolsSpot and negate common attacksIdentify common Web-based attacks and exposures as well as recommendations for closing those holesWho This Book Is ForAnyone who has some familiarity with computers and an interest in information security and penetration testing. 

Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College.Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies.An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security.  

1. What Is Penetration Testing?   Information Security   Penetration Testing vs Security Assessments   Who does Penetration Testing2. Digging for Information   Google Hacking   Social Networking   Job Sites   Technical sources (e.g., regional Internet registries)3. What’s Open?   Port scanning   Banner grabbing4. Vulnerabilities   Scanning for vulnerabilities   Nessus vs Nexpose vs OpenVAS   Fuzzing5. Exploitation   Using Metasploit   Exploit Database6. Breaking Web Sites   Common Vulnerabilities   Web Scanning7. Reporting

Erscheint lt. Verlag 22.7.2016
Zusatzinfo XV, 115 p. 41 illus., 34 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Informatik Software Entwicklung Qualität / Testen
Schlagworte Breaking • Coding • Penetration • programming • Software • Systems • TDD • test driven • Testing • Unit Test
ISBN-10 1-4842-1857-4 / 1484218574
ISBN-13 978-1-4842-1857-0 / 9781484218570
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 13,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99