
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Pen Testing from Contract to Report
About this book
Protect your system or web application with this accessible guide
Penetration tests, also known as 'pen tests', are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications.
Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions.
In Pen Testing from Contract to Report readers will also find:
- Content mapped to certification exams such as the CompTIA PenTest+
- Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and more
- Accompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies
Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title Page
- Copyright Page
- Dedication
- Foreword
- Preface
- Acknowledgement
- List of Abbreviations
- Companion Website
- 1 Introduction to Penetration Testing
- 2 The Contract
- 3 Law and Legislation
- 4 Footprinting and Reconnaissance
- 5 Scanning Networks
- 6 Enumeration
- 7 Vulnerability Analysis
- 8 System Hacking
- 9 Malware Threats
- 10 Sniffing
- 11 Social Engineering
- 12 Denial of Service
- 13 Session Hijacking
- 14 Evading IDS, Firewalls, and Honeypots
- 15 Web Servers
- 16 Web Application Hacking
- 17 SQL Injection
- 18 Hacking Wireless Networks
- 19 Mobile Platforms
- 20 Internet of Things (IoT)
- 21 Cloud Computing
- 22 The Report
- Index
- End User License Agreement