CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)

This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetratio...

Full description

Bibliographic Details
Main Authors: Linn, Heather, Nutting, Ray (Author)
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2022
Edition:2nd edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05146nmm a2200433 u 4500
001 EB002012295
003 EBX01000000000000001175194
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220317 ||| eng
020 |a 9781264274901 
050 4 |a QA76.9.A25 
100 1 |a Linn, Heather 
245 0 0 |a CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)  |c Heather Linn, Raymond G. Nutting 
250 |a 2nd edition 
260 |a New York  |b McGraw-Hill Education  |c 2022 
300 |a 547 pages 
505 0 |a Chapter 11 Tools and Code Analysis -- Logic Constructs -- Data Structures -- Other Programming Concepts -- Practical Examples -- Specialized Examples -- Chapter Review -- Chapter 12 Tools Inventory -- Appendix A Objective Map -- Objective Map: Exam PT0-002 -- Appendix B About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Other Book Resources -- Technical Support -- Glossary -- Index 
505 0 |a Data Exposure and Insecure Configuration -- Inclusion Attacks -- Race Conditions -- Chapter Review -- Chapter 6 Attacking the Cloud -- Account and Privilege Attacks -- Misconfigured Cloud Assets -- Cloud-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices -- Virtual and Containerized Systems -- Other Nontraditional Systems -- Chapter Review -- Chapter 8 Social Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering and Physical Attacks -- Countermeasures -- Chapter Review -- References -- Chapter 9 Post-Exploitation -- Enumeration -- Privilege Escalation -- Covert Channels and Data Exfiltration -- Lateral Movement -- Maintaining Persistence -- Covering Your Tracks -- Chapter Review -- Chapter 10 Post-Engagement Activities -- The Anatomy of a Pentest Report -- Findings, Recommendations, and Analysis -- Post-Engagement Activities -- Chapter Review -- References --  
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Planning and Engagement -- Governance, Risk, and Compliance -- Testing Limitations -- Contracts and Documentation -- Scope and Requirements -- Professionalism and Integrity -- Chapter Review -- References -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active Reconnaissance -- Vulnerability Scanning and Analysis -- Chapter Review -- References -- Chapter 3 Network-Based Attacks -- Name Resolution Exploits -- Password Attacks -- Stress Testing Applications and Protocols -- Network Packet Manipulation -- Layer 2 Attacks -- Researching an Attack -- Chapter Review -- Chapter 4 Wireless and RF Attacks -- 802.11 Wireless -- Attacking Bluetooth -- RFID and NFC -- Chapter Review -- References -- Chapter 5 Web and Database Attacks -- OWASP Top Ten -- Injection Attacks -- Attacking Authentication and Session Management --  
653 |a Computer networks / Security measures / Examinations / fast 
653 |a Tests d'intrusion / Examens / Guides de l'étudiant 
653 |a Telecommunications engineers / Certification / Examinations / Study guides 
653 |a Computer networks / Security measures / Examinations / Study guides 
653 |a Penetration testing (Computer security) / Examinations / Study guides 
653 |a Telecommunications engineers / Certification / Examinations / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant 
700 1 |a Nutting, Ray  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781264274901 
776 |z 1264274904 
776 |z 9781264274895 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781264274901/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 374 
082 0 |a 005.8 
520 |a This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetration testers, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: Planning and engagement Information gathering Vulnerability scanning Network-based attacks Wireless and radio frequency attacks Web and database attacks Cloud attacks Specialized and fragile systems Social Engineering and physical attacks Post-exploitation tools and techniques Post-engagement activities Tools and code analysis And more Online content includes: 170 practice exam questions Interactive performance-based questions Test engine that provides full-length practice exams or customizable quizzes by chapter or exam objective