CompTIA PenTest+ Guide to Penetration Testing - Rob Wilson

CompTIA PenTest+ Guide to Penetration Testing

(Autor)

Buch | Softcover
784 Seiten
2023 | New edition
Course Technology Inc (Verlag)
978-0-357-95065-4 (ISBN)
64,80 inkl. MwSt
Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information you need to successfully pass the CompTIA PenTest+ PTO-002 certification exam and contains detailed examples, projects, and hands-on activities (including virtual machine labs and interactive online features) where you can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing, and then walks you through the process of building your own penetration testing lab of virtual machines (hosted on your own computer, which is used to practice the use of pen testing tools and methods). A final project guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.

Robert S. Wilson is the cybersecurity curriculum coordinator and a cybersecurity instructor for Willis College (Canada’s oldest career college). Rob created Willis College’s Software Development and Cybersecurity Analyst (CSA) programs. Willis College’s CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (he worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity.

1. Introduction to Penetration Testing.
2. Setting Up a Penetration Testing Lab.
3. Planning and Scoping.
4. Information Gathering.
5. Performing Vulnerability Scanning.
6. Exploitation Methods and Tools.
7. Network Attacks and Attack Vectors.
8. Wireless and Specialized Systems Attack Vectors and Attacks.
9. Application-Based Attack Vectors and Attacks.
10. Host Attack Vectors and Cloud Technologies Attacks.
11. Social Engineering and Physical Attacks.
12. Reporting and Communication.
13. Writing and Understanding Code.
14. The Final Penetration Testing Project.

Erscheinungsdatum
Verlagsort Boston, MA
Sprache englisch
Maße 217 x 277 mm
Gewicht 1043 g
Themenwelt Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Zertifizierung
Wirtschaft
ISBN-10 0-357-95065-8 / 0357950658
ISBN-13 978-0-357-95065-4 / 9780357950654
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich