Jump to navigation

Penetration Testing - Protecting Networks and Systems

  • Introduces the concepts and techniques used in penetration testing, giving readers an understanding of the principles of ethical hacking.
  • Covers the topics required for the Certified Penetration Testing Engineer (CPTE) examination, making it a handy study guide for anyone preparing to take the exam.
  • Buy this guide today and gain a solid understanding of the principles and practice of penetration testing.
Options:
Quantity:
Penetration Testing: Protecting Networks and Systems

The fundamentals of penetration testing explained

In this book, the author covers the penetration test process: reconnaissance, enumeration, vulnerability assessment and the eventual launch of an attack. He explains how to prepare the test report, focusing on what information to include in the report and how best to present it to the client. The book also discusses the potential dangers of new technology adopted to improve business operations (e.g. employee remote access, wireless communications, public-facing web applications), but, at the same time, creating new vulnerabilities.

Focusing on the techniques

Avoiding a detailed, technical analysis of the tools currently used by today’s pen testers, which often come in and out of fashion, the book instead focuses on the range of techniques employed by professional pen testers. The author draws on his wealth of experience and provides real-world examples to give readers a practical understanding of how to conduct a penetration test. He also explains how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organisation is within acceptable levels.

Contents

  1. Introduction to Penetration Testing
  2. Preparing to Conduct a Penetration Test
  3. Reconnaissance
  4. Active Reconnaissance and Enumeration
  5. Vulnerability Assessments
  6. Hacking Windows and UNIX
  7. Launching the Attack
  8. Attacking Web Applications
  9. Preparing the Report

About the author

Kevin Henry has 35 years’ experience working on computer systems, initially as an operator on the largest mini-computer installation in Canada, and then in various programmer and analyst roles before moving into computer audit and security. Kevin provides security auditing, training and educational programs for major clients and governments around the world, and is a frequent speaker on the security conference circuit.

Buy today, in any format. We’ll send you a download link right away, or dispatch today for fast delivery to your selected destination.

Authors: Kevin M. Henry
Publishers:  IT Governance Publishing
Format: ePub
ISBN13: 9781849283731
Pages: 234
Published: 21 Jun 2012
Availability: Always Available
Format: Adobe eBook
ISBN13: 9781849283724
Pages: 221
Published: 21 Jun 2012
Availability: Always Available
Format: Kindle
ISBN13: 9781849283717
Pages: 234
Published: 21 Jun 2012
Availability: Always Available
Format: Softcover
ISBN13: 9781849283717
Pages: 234
Published: 21 Jun 2012
Availability: In Stock
Product Rating: (0.00)   # of Ratings: 0   (Only registered customers can rate)

There are no comments for this product.

Save 30% on ITG Training Courses

Share

Print




People who bought this also bought


Your basket:

0 items
£0.00 (GBP)
QtyTotal
Your shopping cart is currently empty.
+44 (0) 845 070 1750
Currency:
live chat support software