CHF38.90
Download steht sofort bereit
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.
Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
The CompTIA study guide helps you master all the topics on the Pentest+ exam, including:
Autorentext
Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. He has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the Worldwide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
Omar is an active member of the security community, where he leads several industrywide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar often delivers technical presentations at many cybersecurity conferences. He is the author of more than 20 books and video courses. You can follow Omar on any of the following:
You can follow Ron on any of the following:
Inhalt
Introduction xxiii Chapter 1 Introduction to Ethical Hacking and Penetration Testing 3 "Do I Know This Already?" Quiz 3 Understanding Ethical Hacking and Penetration Testing 6 Understanding the Current Threat Landscape 7 Exploring Penetration Testing Methodologies 10 Building Your Own Lab 16 Requirements and Guidelines for Penetration Testing Labs 18 What Tools Should You Use in Your Lab? 18 What if You Break Something? 19 Review All Key Topics 20 Define Key Terms 20 Q&A 21 Chapter 2 Planning and Scoping a Penetration Testing Assessment 25 "Do I Know This Already?" Quiz 25 Explaining the Importance of the Planning and Preparation Phase 29 Understanding the Legal Concepts of Penetration Testing 41 Learning How to Scope a Penetration Testing Engagement Properly 44 Learning the Key Aspects of Compliance-Based Assessments 50 Review All Key Topics 58 Define Key Terms 59 Q&A 59 Chapter 3 Information Gathering and Vulnerability Identification 63 "Do I Know This Already?" Quiz 63 Understanding Information Gathering and Reconnaissance 67 Understanding the Art of Performing Vulnerability Scans 103 Understanding How to Analyze Vulnerability Scan Results 112 Review All Key Topics 116 Define Key Terms 117 Q&A 117 Chapter 4 Social Engineering Attacks 121 "Do I Know This Already?" Quiz 121 Understanding Social Engineering Attacks 125 Phishing 126 Pharming 126 Malvertising 127 Spear Phishing 128 SMS Phishing 134 Voice Phishing 135 Whaling 135 Elicitation, Interrogation, and Impersonation (Pretexting) 135 Social Engineering Motivation Techniques 137 Shoulder Surfing 137 USB Key Drop and Social Engineering 138 Review All Key Topics 138 Define Key Terms 139 Q&A 139 Chapter 5 Exploiting Wired and Wireless Networks 143 "Do I Know This Already?" Quiz 143 Exploiting Network-Based Vulnerabilities 148 Exploiting Wireless and RF-Based Attacks and Vulnerabilities 185 Review All Key Topics 200 Define Key Terms 202 Q&A 202 Chapter 6 Exploiting Application-Based Vulnerabilities 207 "Do I Know This Already?" Quiz 207 Overview of Web Applications for Security Professionals 213 How to Build Your Own Web Application Lab 224 Understanding Injection-Based Vulnerabilities 227 Exploiting Authentication-Based Vulnerabilities 242 Exploiting Authorization-Based Vulnerabilities 250 Understanding Cross-Site Scripting (XSS) Vulnerabilities 252 Understan…