|
|
|
|
LEADER |
05146nmm a2200433 u 4500 |
001 |
EB002012295 |
003 |
EBX01000000000000001175194 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220317 ||| eng |
020 |
|
|
|a 9781264274901
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Linn, Heather
|
245 |
0 |
0 |
|a CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)
|c Heather Linn, Raymond G. Nutting
|
250 |
|
|
|a 2nd edition
|
260 |
|
|
|a New York
|b McGraw-Hill Education
|c 2022
|
300 |
|
|
|a 547 pages
|
505 |
0 |
|
|a Chapter 11 Tools and Code Analysis -- Logic Constructs -- Data Structures -- Other Programming Concepts -- Practical Examples -- Specialized Examples -- Chapter Review -- Chapter 12 Tools Inventory -- Appendix A Objective Map -- Objective Map: Exam PT0-002 -- Appendix B About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Other Book Resources -- Technical Support -- Glossary -- Index
|
505 |
0 |
|
|a Data Exposure and Insecure Configuration -- Inclusion Attacks -- Race Conditions -- Chapter Review -- Chapter 6 Attacking the Cloud -- Account and Privilege Attacks -- Misconfigured Cloud Assets -- Cloud-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices -- Virtual and Containerized Systems -- Other Nontraditional Systems -- Chapter Review -- Chapter 8 Social Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering and Physical Attacks -- Countermeasures -- Chapter Review -- References -- Chapter 9 Post-Exploitation -- Enumeration -- Privilege Escalation -- Covert Channels and Data Exfiltration -- Lateral Movement -- Maintaining Persistence -- Covering Your Tracks -- Chapter Review -- Chapter 10 Post-Engagement Activities -- The Anatomy of a Pentest Report -- Findings, Recommendations, and Analysis -- Post-Engagement Activities -- Chapter Review -- References --
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Planning and Engagement -- Governance, Risk, and Compliance -- Testing Limitations -- Contracts and Documentation -- Scope and Requirements -- Professionalism and Integrity -- Chapter Review -- References -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active Reconnaissance -- Vulnerability Scanning and Analysis -- Chapter Review -- References -- Chapter 3 Network-Based Attacks -- Name Resolution Exploits -- Password Attacks -- Stress Testing Applications and Protocols -- Network Packet Manipulation -- Layer 2 Attacks -- Researching an Attack -- Chapter Review -- Chapter 4 Wireless and RF Attacks -- 802.11 Wireless -- Attacking Bluetooth -- RFID and NFC -- Chapter Review -- References -- Chapter 5 Web and Database Attacks -- OWASP Top Ten -- Injection Attacks -- Attacking Authentication and Session Management --
|
653 |
|
|
|a Computer networks / Security measures / Examinations / fast
|
653 |
|
|
|a Tests d'intrusion / Examens / Guides de l'étudiant
|
653 |
|
|
|a Telecommunications engineers / Certification / Examinations / Study guides
|
653 |
|
|
|a Computer networks / Security measures / Examinations / Study guides
|
653 |
|
|
|a Penetration testing (Computer security) / Examinations / Study guides
|
653 |
|
|
|a Telecommunications engineers / Certification / Examinations / fast
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant
|
700 |
1 |
|
|a Nutting, Ray
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9781264274901
|
776 |
|
|
|z 1264274904
|
776 |
|
|
|z 9781264274895
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781264274901/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 374
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetration testers, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: Planning and engagement Information gathering Vulnerability scanning Network-based attacks Wireless and radio frequency attacks Web and database attacks Cloud attacks Specialized and fragile systems Social Engineering and physical attacks Post-exploitation tools and techniques Post-engagement activities Tools and code analysis And more Online content includes: 170 practice exam questions Interactive performance-based questions Test engine that provides full-length practice exams or customizable quizzes by chapter or exam objective
|