Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition by Thomas Wilhelm – Ebook PDF Instant Download/Delivery. 9781597499934 ,1597499935
Full download Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition after payment
Product details:
ISBN 10: 1597499935
ISBN 13: 9781597499934
Author: Thomas Wilhelm
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.
All disc-based content for this title is now available on the Web.
-
Find out how to turn hacking and pen testing skills into a professional career
-
Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
-
Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
-
Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition Table of contents:
Chapter 1. Introduction
Chapter Points
Introduction
Summary
Chapter 2. Ethics and Hacking
Chapter Points
Getting Permission to Hack
Code of Ethics Canons [(ISC)2]
Why Stay Ethical?
Ethical Standards
Computer Crime Laws
Getting Permission to Hack
Summary
References
Chapter 3. Setting up Your Lab
Chapter Points
Introduction
Summary
Reference
Chapter 4. Methodologies and Frameworks
Chapter Points
Introduction
Summary
References
Chapter 5. Pentest Project Management
Chapter Points
Introduction
Summary
References
Chapter 6. Information Gathering
Chapter Points
Introduction
Summary
Reference
Chapter 7. Vulnerability Identification
Chapter Points
Introduction
Summary
Chapter 8. Vulnerability Exploitation
Chapter Points
Introduction
Summary
Chapter 9. Local System Attacks
Chapter Points
Introduction
Summary
Chapter 10. Privilege Escalation
Chapter Points
Introduction
Summary
Reference
Chapter 11. Targeting Support Systems
Chapter Points
Introduction
Summary
Chapter 12. Targeting the Network
Chapter Points
Introduction
Summary
Chapter 13. Web Application Attack Techniques
Chapter Points
Introduction
Summary
Chapter 14. Reporting Results
Chapter Points
Introduction
Summary
Reference
Chapter 15. Hacking as a Career
Chapter Points
Introduction
Summary
References
Index
People also search for Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition:
professional penetration testing pdf
kali linux professional penetration testing distro
professional penetration testing thomas wilhelm
professional penetration testing report