Fr. 65.00

Penetration Testing Essentials

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Klappentext Becoming a professional penetration tester (or pen tester or ethical hacker) can be a major step forward in an IT security career. But before one can get the most well known professional certification for ethical hackers, you need foundational knowledge and at least 2 years of versified IT experience. Before you begin a formal career and path to certification, you'll want to understand the essential technical and behavioral ways that attackers compromise computer security and what tools and techniques the penetration testers will use to discovered weaknesses before the bad guys do. In this book you'll learn:* Pen Testing Methodology* Security and Cryptography Fundamentals* Information Gathering Techniques* Scanning and Enumeration* Breaking and Entering a System* Maintaining Access to A System* Covering Your Tracks* Detecting and Targeting Wireless Networks* Escaping and Evading Detection* System Hardening* Building a Pen Testing Lab* The Pen Testing Toolbox Zusammenfassung Becoming a professional penetration tester (or pen tester or ethical hacker) can be a major step forward in an IT security career. But before one can get the most well known professional certification for ethical hackers, you need foundational knowledge and at least 2 years of versified IT experience. Before you begin a formal career and path to certification, you'll want to understand the essential technical and behavioral ways that attackers compromise computer security and what tools and techniques the penetration testers will use to discovered weaknesses before the bad guys do. In this book you'll learn:* Pen Testing Methodology* Security and Cryptography Fundamentals* Information Gathering Techniques* Scanning and Enumeration* Breaking and Entering a System* Maintaining Access to A System* Covering Your Tracks* Detecting and Targeting Wireless Networks* Escaping and Evading Detection* System Hardening* Building a Pen Testing Lab* The Pen Testing Toolbox Inhaltsverzeichnis Introduction xviiChapter 1 Introduction to Penetration Testing 1Defining Penetration Testing 1Preserving Confidentiality, Integrity, and Availability 4Appreciating the Evolution of Hacking 5Chapter 2 Introduction to Operating Systems and Networking 15Comparing Common Operating Systems 15Exploring Networking Concepts 21Chapter 3 Introduction to Cryptography 37Recognizing the Four Goals of Cryptography 37The History of Encryption 38Speaking Intelligently About Cryptography 39Comparing Symmetric and Asymmetric Cryptography 41Transforming Data via Hashing 47A Hybrid System: Using Digital Signatures 48Working with PKI 50Chapter 4 Outlining the Pen Testing Methodology 55Determining the Objective and Scope of the Job 55Choosing the Type of Test to Perform 58Gaining Permission via a Contract 60Following the Law While Testing68Chapter 5 Gathering Intelligence 71Introduction to Intelligence Gathering 71Examining a Company's Web Presence 73Finding Websites That Don't Exist Anymore 77Gathering Information with Search Engines 78Targeting Employees with People Searches 80Discovering Location 81Do Some Social Networking 82Looking via Financial Services 85Investigating Job Boards 86Searching Email 86Extracting Technical Information 87Chapter 6 Scanning and Enumeration 89Introduction to Scanning89Checking for Live Systems 91Performing Port Scanning 96Identifying an Operating System 107Scanning for Vulnerabilities 110Using Proxies (Or Keeping Your Head Down) 110Performing Enumeration 112Chapter 7 Conducting Vulnerability Scanning 121Introduction to Vulnerability Scanning 122Recognizing the Limitations of Vulnerability Scanning 123Outlining the Vulnerability Scanning Process 124Types of Scans That Can Be Performed 127Chapter 8 Cracking Passwords 129Recognizing Strong Passwords 129Choosing a Password-Cracking Technique 130Executing a Passive ...

Product details

Authors Oriyano, Sean Philip Oriyano, Sean-Philip Oriyano, Sp Oriyano, Robert Shimonski
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Paperback / Softback
Released 31.05.2016
 
EAN 9781119235309
ISBN 978-1-119-23530-9
No. of pages 360
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, Informatik, computer science, Computer Security & Cryptography, Computersicherheit u. Kryptographie

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.