The perfect introduction to pen testing for all IT professionals and students
· Clearly explains key concepts, terminology, challenges, tools, and skills
· Covers the latest penetration testing standards from NSA, PCI, and NIST
Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective.
Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting.
You’ll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you’ve learned.
Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.
LEARN HOW TO
· Understand what pen testing is and how it’s used
· Meet modern standards for comprehensive and effective testing
· Review cryptography essentials every pen tester must know
· Perform reconnaissance with Nmap, Google searches, and ShodanHq
· Use malware as part of your pen testing toolkit
· Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry
· Pen test websites and web communication
· Recognize SQL injection and cross-site scripting attacks
· Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA
· Identify Linux vulnerabilities and password cracks
· Use Kali Linux for advanced pen testing
· Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering
· Systematically test your environment with Metasploit
· Write or customize sophisticated Metasploit exploits
"synopsis" may belong to another edition of this title.
Normal 0 false false false EN-US X-NONE X-NONE Chuck Easttom has been in the IT industry for well over 25 years and cybersecurity for over 15. He has over 40 industry certifications, and has authored 24 other books. He is also an inventor with 13 patents. Chuck is a frequent speaker at various security conferences including Defcon, ISC2 Security Congress, Secure World, and many others. He also has authored a number of papers on security-related topics including malware development, penetration testing, and hacking techniques. He also has hands-on experience consulting on cyber security issues and conducting penetration tests.
"About this title" may belong to another edition of this title.
£ 2.98 shipping within U.S.A.
Destination, rates & speedsSeller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABTA-5430
Quantity: 2 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New.SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-282599
Quantity: 15 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
Paperback. Condition: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 002150396U
Quantity: 3 available
Seller: Goodbooks Company, Springdale, AR, U.S.A.
Condition: acceptable. This copy may contain significant wear, including bending, writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose or missing pages and may not include access codes or CD. Seller Inventory # GBV.0789759373.A
Quantity: 1 available
Seller: TextbookRush, Grandview Heights, OH, U.S.A.
Condition: Very Good. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Seller Inventory # 52310020
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Seller Inventory # 30108501-5
Quantity: 3 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condition: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9780789759375
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 30108501
Quantity: 6 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 30108501
Quantity: 6 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. The perfect introduction to pen testing for all IT professionals and students Welcome to todays most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills youll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. Youll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what youve learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assetsand expand your career options. LEARN HOW TO Understand what pen testing is and how its used Meet modern standards for comprehensive and effective testing Review cryptography essentials every pen tester must know Perform reconnaissance with Nmap, Google searches, and ShodanHq Use malware as part of your pen testing toolkit Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry Pen test websites and web communication Recognise SQL injection and cross-site scripting attacks Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA Identify Linux vulnerabilities and password cracks Use Kali Linux for advanced pen testing Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering Systematically test your environment with Metasploit Write or customize sophisticated Metasploit exploits "Pearson IT cybersecurity curriculum"--Cover. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9780789759375
Quantity: 1 available