Home > Computing and Information Technology > Computer networking and communications > Network security > Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The perfect introduction to pen testing for all IT professionals and students · Clearly explains key concepts, terminology, challenges, tools, and skills · Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options. LEARN HOW TO · Understand what pen testing is and how it’s used · Meet modern standards for comprehensive and effective testing · Review cryptography essentials every pen tester must know · Perform reconnaissance with Nmap, Google searches, and ShodanHq · Use malware as part of your pen testing toolkit · Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry · Pen test websites and web communication · Recognize SQL injection and cross-site scripting attacks · Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA · Identify Linux vulnerabilities and password cracks · Use Kali Linux for advanced pen testing · Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering · Systematically test your environment with Metasploit · Write or customize sophisticated Metasploit exploits

Table of Contents:
Introduction Chapter 1: Introduction to Penetration Testing What Is Penetration Testing? Audits Vulnerability Scans Penetration Tests The Hybrid Test Terminology Methodologies Nature of the Test Approaches Ethical Issues Everything Is Confidential Keep in Your Lane If You Break It, You Bought It Legal Issues Computer Fraud and Abuse Act (CFAA): 18 U.S. Code § 1030 Unlawful Access to Stored Communications: 18 U.S. Code § 2701 Identity Theft Enforcement and Restitution Act Fraud and Related Activity in Connection with Access Devices: 18 U.S. Code § 1029 State Laws International Laws Certifications CEH GPEN OSCP Mile2 CISSP PPT This Book and Certifications Careers in Penetration Testing Security Administrators Commercial Penetration Testing Government/National Defense Law Enforcement Building Your Skillset Summary Test Your Skills Chapter 2: Standards PCI DSS The Actual Test NIST 800-115 Planning Execution Post-Execution National Security Agency InfoSec Assessment Methodology (NSA-IAM) PTES CREST (UK) A Synthesis (Putting Standards Together into a Single Unified Approach) Pre-Engagement The Actual Test Reporting Related Standards OWASP Other Standards ISO 27002 NIST 800-12, Revision 1 NIST 800-14 Summary Test Your Skills Chapter 3: Cryptography Cryptography Basics History of Encryption The Caesar Cipher Atbash Multi-Alphabet Substitution Rail Fence Modern Methods Symmetric Encryption Modification of Symmetric Methods Practical Applications Public Key (Asymmetric) Encryption Digital Signatures Hashing MD5 SHA RIPEMD Windows Hashing MAC and HMAC Rainbow Tables Pass the Hash Password Crackers Steganography Historical Steganography Methods and Tools Cryptanalysis Frequency Analysis Modern Methods Practical Application Learning More Summary Test Your Skills Chapter 4: Reconnaissance Passive Scanning Techniques Netcraft BuiltWith Archive.org Shodan Social Media Google Searching Active Scanning Techniques Port Scanning Enumeration Wireshark Maltego Other OSINT Tools OSINT Website Alexa Web Master Tips Summary Test Your Skills Chapter 5: Malware Viruses How a Virus Spreads Types of Viruses Virus Examples Trojan Horses Other Forms of Malware Rootkit Malicious Web-Based Code Logic Bombs Creating Malware Levels of Malware Writing Skill GUI Tools Simple Script Viruses Creating a Trojan Horse Altering Existing Viruses Summary Test Your Skills Chapter 6: Hacking Windows Windows Details Windows History The Boot Process Important Windows Files Windows Logs The Registry Volume Shadow Copy Windows Password Hashing Windows Hacking Techniques Pass the Hash chntpw Net User Script Login as System Find the Admin Windows Scripting net users net view net share net service netshell Windows Password Cracking Offline NT Registry Editor LCP pwdump ophcrack John the Ripper Detecting Malware in Windows Cain and Abel Summary Test Your Skills Chapter 7: Web Hacking Web Technology Specific Attacks on Websites SQL Script Injection XSS Other Web Attacks Tools Burp Suite BeEF Summary Test Your Skills Chapter 8: Vulnerability Scanning Vulnerabilities CVE NIST OWASP Packet Capture tcpdump Wireshark Network Scanners LanHelper Wireless Scanners/Crackers Aircrack General Scanners MBSA Nessus Nexpose SAINT Web Application Scanners OWASP ZAP Vega Cyber Threat Intelligence Threatcrowd.org Phishtank Internet Storm Center OSINT Summary Test Your Skills Chapter 9: Introduction to Linux Linux History Linux Commands ls Command cd Command Pipe Output finger Command grep Command ps Command pstree Command top Command kill Command Basic File and Directory Commands chown Command chmod Command bg Command fg Command useradd Command userdel Command usermod Command users Command who Command Directories /root /bin /sbin /etc /dev /boot /usr /var /proc Graphical User Interface GNOME KDE Summary Test Your Skills Chapter 10: Linux Hacking More on the Linux OS sysfs Crond Shell Commands Linux Firewall Iptables iptables Configuration Syslog Syslogd Scripting Linux Passwords Linux Hacking Tricks Boot Hack Backspace Hack Summary Test Your Skills Chapter 11: Introduction to Kali Linux Kali Linux History Kali Basics Kali Tools recon-ng Dmitry Sparta John the Ripper Hashcat macchanger Ghost Phisher Summary Test Your Skills Chapter 12: General Hacking Techniques Wi-Fi Testing Create a Hotspot Using Kali as a Hotspot Testing the WAP Administration Other Wi-Fi Issues Social Engineering DoS Well-known DoS Attacks Tools Summary Test Your Skills Chapter 13: Introduction to Metasploit Background on Metasploit Getting Started with Metasploit Basic Usage of msfconsole Basic Commands Searching Scanning with Metasploit SMB Scanner SQL Server Scan SSH Server Scan Anonymous FTP Servers FTP Server How to Use Exploits Exploit Examples Cascading Style Sheets File Format Exploit Remote Desktop Exploit More Exploits Common Error Post Exploits Get Logged-on Users Check VM Enumerate Applications Going Deeper into the Target Summary Test Your Skills Chapter 14: More with Metasploit Meterpreter and Post Exploits ARP NETSTAT PS Navigation Download and Upload Desktops Cameras Key Logger Other Information msfvenom More Metasploit Attacks Formatting All Drives Attacking Windows Server 2008 R2 Attacking Windows via Office Attacking Linux Attacking via the Web Another Linux Attack Linux Post Exploits Summary Test Your Skills Chapter 15: Introduction to Scripting with Ruby Getting Started Basic Ruby Scripting A First Script Syntax Object-Oriented Programming Summary Test Your Skills Chapter 16: Write Your Own Metasploit Exploits with Ruby The API Getting Started Examine an Existing Exploit Extending Existing Exploits Writing Your First Exploit Summary Test Your Skills Chapter 17: General Hacking Knowledge Conferences Dark Web Certification and Training Cyber Warfare and Terrorism Nation State Actors Summary Test Your Skills Chapter 18: Additional Pen Testing Topics Wireless Pen Testing 802.11 Infrared Bluetooth Other Forms of Wireless Wi-Fi Hacking Mainframe and SCADA SCADA Basics Mainframes Mobile Pen Testing Cellular Terminology Bluetooth Attacks Bluetooth/Phone Tools Summary Test Your Skills Chapter 19: A Sample Pen Test Project Pen Test Outline Pre-Test Activities External Internal Optional Items Report Outline Summary Appendix A: Answers to Chapter Multiple Choice Questions 9780789759375 TOC 2/13/2018


Best Sellers


Product Details
  • ISBN-13: 9780789759375
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Height: 230 mm
  • No of Pages: 448
  • Series Title: Pearson It Cybersecurity Curriculum (Itcc)
  • Sub Title: A Hands-On Guide to Reliable Security Audits
  • Width: 180 mm
  • ISBN-10: 0789759373
  • Publisher Date: 29 Jun 2018
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Spine Width: 20 mm
  • Weight: 724 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
Pearson Education (US) -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA