Professional Penetration Testing Creating and Operating a Formal Hacking Lab 1st edition by Thomas Wilhelm – Ebook PDF Instant Download/Delivery.9780080960944, 0080960944
Full download Professional Penetration Testing Creating and Operating a Formal Hacking Lab 1st edition after payment
Product details:
ISBN 10: 0080960944
ISBN 13: 9780080960944
Author: Thomas Wilhelm
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.
Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners.
Professional Penetration Testing Creating and Operating a Formal Hacking Lab 1st Table of contents:
Part 1: Setting Up
Chapter 1: Introduction
- Introduction
- About the Book
- Target Audience
- How to Use This Book
- About the DVD
- Course Material
- Reference Material
- LiveCDs
- Summary
- Solutions Fast Track
- About the Book
- About the DVD
- Reference
Chapter 2: Ethics and Hacking
- Introduction
- Why Stay Ethical?
- Black Hat Hackers
- White Hat Hackers
- Gray Hat Hackers
- Ethical Standards
- Certifications
- Contractor
- Employer
- Educational and Institutional Organizations
- Computer Crime Laws
- Types of Laws
- Type of Computer Crimes and Attacks
- U.S. Federal Laws
- U.S. State Laws
- International Laws
- Safe Harbor and Directive 95/46/EC
- Getting Permission to Hack
- Confidentiality Agreement
- Company Obligations
- Contractor Obligations
- Auditing and Monitoring
- Conflict Management
- Summary
- Solutions Fast Track
- Why Stay Ethical?
- Ethical Standards
- Computer Crime Laws
- Getting Permission to Hack
- Frequently Asked Questions
- Expand Your Skills
- References
Chapter 3: Hacking as a Career
- Introduction
- Career Paths
- Network Architecture
- System Administration
- Applications and Databases
- Certifications
- High-Level Certifications
- Skill- and Vendor-Specific Certifications
- Associations and Organizations
- Professional Organizations
- Conferences
- Local Communities
- Mailing Lists
- Summary
- Solutions Fast Track
- Career Paths
- Certifications
- Associations and Organizations
- Frequently Asked Questions
- Expand Your Skills
- References
Chapter 4: Setting Up Your Lab
- Introduction
- Personal Lab
- Keeping it simple
- Equipment
- Software
- Lab for Book Exercises
- Corporate Lab
- Internal Labs
- External Labs
- Equipment
- Software
- Protecting Penetration Test Data
- Encryption Schemas
- Securing PenTest Systems
- Mobile Security Concerns
- Wireless Lab Data
- Additional Network Hardware
- Routers
- Firewalls
- Intrusion Detection System/Intrusion Prevention System
- Summary
- Solutions Fast Track
- Personal Lab
- Corporate Lab
- Protecting Penetration Test Data
- Additional Network Hardware
- Frequently Asked Questions
- Expand Your Skills
- Reference
Chapter 5: Creating and Using PenTest Targets in Your Lab
- Introduction
- Turn-Key Scenarios versus Real-World Targets
- Problems with Learning to Hack
- Real-World Scenarios
- Turn-Key Scenarios
- What is a LiveCD?
- De-ICE
- Hackerdemia
- pWnOS
- Foundstone
- Open Web Application Security Project
- Using Exploitable Targets
- Operating Systems
- Applications
- Analyzing Malware – Viruses and Worms
- Setting up a Lab
- Other Target Ideas
- CTF Events
- Web-Based Challenges
- Vulnerability Announcements
- Summary
- Solutions Fast Track
- Turn-Key Scenarios versus Real-World Targets
- Turn-Key Scenarios
- Using Exploitable Targets
- Analyzing Malware – Viruses and Worms
- Other Target Ideas
- Frequently Asked Questions
- Expand Your Skills
- References
Chapter 6: Methodologies
- Introduction
- Project Management Body of Knowledge
- Introduction to PMBOK
- Initiating Process Group
- Planning Process Group
- Executing Process Group
- Closing Process Group
- Monitoring and Controlling Process Group
- Information System Security Assessment Framework
- Planning and Preparation – Phase I
- Assessment – Phase II
- Reporting, Clean-up, and Destroy Artifacts – Phase III
- Open Source Security Testing Methodology Manual
- Rules of Engagement
- Channels
- Modules
- Summary
- Solutions Fast Track
- Project Management Body of Knowledge
- Information System Security Assessment Framework
- Open Source Security Testing Methodology Manual
- Frequently Asked Questions
- Expand Your Skills
- References
Chapter 7: PenTest Metrics
- Introduction
- Quantitative, Qualitative, and Mixed Methods
- Quantitative Analysis
- Qualitative Analysis
- Mixed Method Analysis
- Current Methodologies
- Project Management Institute
- ISSAF
- OSSTMM
People also search for Professional Penetration Testing Creating and Operating a Formal Hacking Lab 1st :
penetration testing companies
top penetration testing companies
top 10 penetration testing companies
professional penetration tester