Lýsing:
Primary Audience: This book primarily targets those already in IT looking to transition to security - those in entry level or junior IT positions, up to managers, directors, or those coming from different areas of security trying to learn how pentesting fits into the big picture. Secondary Audience: Readers interested in learning basic pen testing skills for personal use or to advance the security of their home computers.
Annað
- Höfundur: Robert Shimonski
- Útgáfa:1
- Útgáfudagur: 2020-04-01
- Hægt að prenta út 10 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9781119577461
- Print ISBN: 9781119577485
- ISBN 10: 1119577462
Efnisyfirlit
- Cover
- Introduction
- About This Book
- Foolish Assumptions
- Icons Used in This Book
- What You’re Not to Read
- Where to Go from Here
- Part 1: Getting Started with Pen Testing
- Chapter 1: Understanding the Role Pen Testers Play in Security
- Looking at Pen Testing Roles
- Getting Certified
- Gaining the Basic Skills to Pen Test
- Introducing Cybercrime
- What You Need to Get Started
- Deciding How and When to Pen Test
- Taking Your First Steps
- Chapter 2: An Overview Look at Pen Testing
- The Goals of Pen Testing
- Scanning Maintenance
- Hacker Agenda
- Doing Active Reconnaissance: How Hackers Gather Intelligence
- Chapter 3: Gathering Your Tools
- Considerations for Your Toolkit
- Nessus
- Wireshark
- Kali Linux
- Nmap
- Chapter 1: Understanding the Role Pen Testers Play in Security
- Chapter 4: Penetrate and Exploit
- Understanding Vectors and the Art of Hacking
- Examining Types of Penetration Attacks
- Cryptology and Encryption
- Using Metasploit Framework and Pro
- Chapter 5: Assumption (Man in the Middle)
- Toolkit Fundamentals
- Listening In to Collect Data
- Chapter 6: Overwhelm and Disrupt (DoS/DDoS)
- Toolkit Fundamentals
- Understanding Denial of Service (DoS) Attacks
- Buffer Overflow Attacks
- Fragmentation Attacks
- Smurf Attacks
- Tiny Packet Attacks
- Xmas Tree Attacks
- Chapter 7: Destroy (Malware)
- Toolkit Fundamentals
- Malware
- Ransomware
- Other Types of Destroy Attacks
- Chapter 8: Subvert (Controls Bypass)
- Toolkit Fundamentals
- Attack Vectors
- Phishing
- Spoofing
- Malware
- Chapter 9: Preparing for the Pen Test
- Handling the Preliminary Logistics
- Gathering Requirements
- Coming Up with a Plan
- Having a Backout Plan
- Chapter 10: Conducting a Penetration Test
- Attack!
- Looking at the Pen Test from Inside
- Documenting Your Every Move
- Other Capture Methods and Vectors
- Assessment
- Prevention
- Chapter 11: Reporting
- Structuring the Pen Test Report
- Creating a Professional and Accurate Report
- Delivering the Report: Report Out Fundamentals
- Updating the Risk Register
- Chapter 12: Making Recommendations
- Understanding Why Recommendations Are Necessary
- Seeing How Assessments Fit into Recommendations
- Networks
- Systems
- General Security Recommendations: All Systems
- More Recommendations
- Chapter 13: Retesting
- Looking at the Benefits of Retesting
- Understanding the Reiterative Nature of Pen Testing and Retesting
- Determining When to Retest
- Choosing What to Retest
- Running a Pen Retest
- Chapter 14: Top Ten Myths About Pen Testing
- All Forms of Ethical Hacking Are the Same
- We Can’t Afford a Pen Tester
- We Can’t Trust a Pen Tester
- We Don’t Trust the Tools
- Pen Tests Are Not Done Often
- Pen Tests Are Only for Technical Systems
- Contractors Can’t Make Great Pen Testers
- Pen Test Tool Kits Must Be Standardized
- Pen Testing Itself Is a Myth and Unneeded
- Pen Testers Know Enough and Don’t Need to Continue to Learn
- Chapter 15: Ten Tips to Refine Your Pen Testing Skills
- Continue Your Education
- Build Your Toolkit
- Think outside the Box
- Think Like a Hacker
- Get Involved
- Use a Lab
- Stay Informed
- Stay Ahead of New Technologies
- Build Your Reputation
- Learn about Physical Security
- Chapter 16: Ten Sites to Learn More About Pen Testing
- SANS Institute
- GIAC Certifications
- Software Engineering Institute
- (Assorted) Legal Penetration Sites
- Open Web Application Security Project
- Tenable
- Nmap
- Wireshark
- Dark Reading
- Offensive Security
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 16110
- Útgáfuár : 2020
- Leyfi : 379