Penetration Testing  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849283731
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849283731 Price: INR 2619.75
Add to cart Buy Now
Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. 
Rating
Description
Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. 
Table of contents
  • Cover
  • Title
  • Copyright
  • Preface
  • About The Author
  • Acknowledgements
  • Contents
  • Introduction
  • Chapter 1: Introduction to Penetration Testing
    • Case study
    • Security basics
    • Risk management
    • The threat environment
    • Overview of the steps to penetration testing
    • Penetration testing versus hacking
    • Benefits of penetration testing
    • Summary
    • Key learning points
    • Questions
  • Chapter 2: Preparing to Conduct a Penetration Test
    • Approval and scope
    • Planning
    • Summary
    • Questions
  • Chapter 3: Reconnaissance
    • The start of the test
    • Physical information gathering
    • Other data sources
    • Avoiding footprinting
    • Key learning points
    • Questions
  • Chapter 4: Active Reconnaissance and Enumeration
    • Port scanning
    • Countermeasures to active reconnaissance
    • Key learning points
    • Questions
  • Chapter 5: Vulnerability Assessments
    • The attack vectors
    • References and sources of vulnerabilities
    • Using vulnerability assessment tools
    • PCI DSS requirements
    • Malicious code
    • Reporting on the vulnerability assessment
    • Key learning points
    • Questions
  • Chapter 6: Hacking Windows® and UNIX
    • Having fun
    • Common hacking initiatives
    • Defeating data theft
    • Protecting against unauthorized access
    • Access controls
    • Actions of the attacker
    • Focus on UNIX/Linux
    • Advanced attacks
    • Source code review
    • Case study: Attack on a Chinese bank
    • Key learning points
    • Questions
  • Chapter 7: Launching the Attack
    • Steps to an exploit
    • Attacking wireless networks
    • Pen testing wireless
    • Network sniffing
    • Firewalls
    • Intrusion detection and prevention systems (IDS/IPS)
    • Key learning points
    • Questions
  • Chapter 8: Attacking Web Applications
    • The steps in attacking a web application
    • Questions
  • Chapter 9: Preparing the Report
    • Determining risk levels
    • Risk response
    • Report confidentiality
    • Delivering the report
    • Key learning points
    • Questions
  • Appendix 1: Linux
  • Appendix 2: Encryption
    • Concepts of cryptography
  • Appendix 3: Regulations and Legislation
    • Examples of regulations and legislation
    • Protection of intellectual property
  • Appendix 4: Incident Management
    • Concepts of incident management
  • Additional Questions and Answers
    • Answers
  • References
  • ITG Resources
User Reviews
Rating