Mastering Nexpose and Metasploit shows you how to perform penetration tests and vulnerability management using the power of Nexpose and Metasploit together, leveraging their strengths to provide you with the most complete arsenal of hacking and pen testing tools. Mastering Nexpose and Metasploit will help you meet your information security and compliance needs. Metasploit has rapidly become a go-to tool for hackers, pen testers, and InfoSec professionals, and Metasploit's integration with Nexpose has introduced new synergies that enable both products to be used more effectively together than on their own. When used together, Nexpose and Metasploit will help you identify any weaknesses in your system or network. Author James Broad shows you how to get the most out of Nexpose and Metasploit, teaching you how to install, update, and configure the software, then moving on to advanced techniques. You'll create the lab environment using configured lab machines and links to trial software that complete the lab experience. Broad has worked closely with the software engineers at Rapid7, the developers of Nexpose and Metasploit, to detail the integration of the software and develop exercises that reinforce the topics covered in all the chapters of the book. * Leverage Nexpose and Metasploit to perform penetration tests and vulnerability management* Learn to use these powerful tools through a lab-based approach, with an online lab disk available for download* Author James Broad has worked closely with the software engineers at Rapid7, the developers of Nexpose and Metasploit
"synopsis" may belong to another edition of this title.
James Broad (CISSP, C|EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation's most critical sectors including defense, law enforcement, intelligence, finance and healthcare.
"About this title" may belong to another edition of this title.
(No Available Copies)
If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!Create a Want