The perfect introduction to pen testing for all IT professionals and students * Clearly explains key concepts, terminology, challenges, tools, and skills * Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO * Understand what pen testing is and how it's used * Meet modern standards for comprehensive and effective testing * Review cryptography essentials every pen tester must know * Perform reconnaissance with Nmap, Google searches, and ShodanHq * Use malware as part of your pen testing toolkit * Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry * Pen test websites and web communication * Recognize SQL injection and cross-site scripting attacks * Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA * Identify Linux vulnerabilities and password cracks * Use Kali Linux for advanced pen testing * Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering * Systematically test your environment with Metasploit * Write or customize sophisticated Metasploit exploits
Normal 0 false false false EN-US X-NONE X-NONE Chuck Easttom has been in the IT industry for well over 25 years and cybersecurity for over 15. He has over 40 industry certifications, and has authored 24 other books. He is also an inventor with 13 patents. Chuck is a frequent speaker at various security conferences including Defcon, ISC2 Security Congress, Secure World, and many others. He also has authored a number of papers on security-related topics including malware development, penetration testing, and hacking techniques. He also has hands-on experience consulting on cyber security issues and conducting penetration tests.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 3,50 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Bestandsnummer des Verkäufers ABTA-5430
Anzahl: 2 verfügbar
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New.SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Bestandsnummer des Verkäufers ABEJUNE24-282599
Anzahl: 15 verfügbar
Anbieter: Textbooks_Source, Columbia, MO, USA
Paperback. Zustand: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Bestandsnummer des Verkäufers 002150396U
Anzahl: 3 verfügbar
Anbieter: Goodbooks Company, Springdale, AR, USA
Zustand: acceptable. This copy may contain significant wear, including bending, writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose or missing pages and may not include access codes or CD. Bestandsnummer des Verkäufers GBV.0789759373.A
Anzahl: 1 verfügbar
Anbieter: TextbookRush, Grandview Heights, OH, USA
Zustand: Very Good. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Bestandsnummer des Verkäufers 52310020
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Bestandsnummer des Verkäufers 30108501-5
Anzahl: 3 verfügbar
Anbieter: Grand Eagle Retail, Fairfield, OH, USA
Paperback. Zustand: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9780789759375
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 30108501
Anzahl: 6 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 30108501
Anzahl: 6 verfügbar
Anbieter: AussieBookSeller, Truganina, VIC, Australien
Paperback. Zustand: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. Bestandsnummer des Verkäufers 9780789759375
Anzahl: 1 verfügbar