SFr. 94.10
€ 101.63
BTC 0.0018
LTC 1.514
ETH 0.0379


bestellen

Artikel-Nr. 23121905


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:



Autor(en): 
  • William Easttom
  • Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   Auf Bestellung (Lieferzeit unbekannt)
    Veröffentlichung:  Juni 2018  
    Genre:  EDV / Informatik 
    ISBN:  9780789759375 
    EAN-Code: 
    9780789759375 
    Verlag:  Pearson Academic 
    Einband:  Kartoniert  
    Sprache:  English  
    Dimensionen:  H 230 mm / B 180 mm / D 20 mm 
    Gewicht:  724 gr 
    Seiten:  448 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    The perfect introduction to pen testing for all IT professionals and students

    · Clearly explains key concepts, terminology, challenges, tools, and skills

    · Covers the latest penetration testing standards from NSA, PCI, and NIST

    Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.

    Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.

    You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.

    Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

    LEARN HOW TO

    · Understand what pen testing is and how it’s used

    · Meet modern standards for comprehensive and effective testing

    · Review cryptography essentials every pen tester must know

    · Perform reconnaissance with Nmap, Google searches, and ShodanHq

    · Use malware as part of your pen testing toolkit

    · Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry

    · Pen test websites and web communication

    · Recognize SQL injection and cross-site scripting attacks

    · Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA

    · Identify Linux vulnerabilities and password cracks

    · Use Kali Linux for advanced pen testing

    · Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering

    · Systematically test your environment with Metasploit

    · Write or customize sophisticated Metasploit exploits

      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024
    Jetzt auch mit BitCoin bestellen!