CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)

This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetratio...

Full description

Bibliographic Details
Main Authors: Linn, Heather, Nutting, Ray (Author)
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2022
Edition:2nd edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 11 Tools and Code Analysis
  • Logic Constructs
  • Data Structures
  • Other Programming Concepts
  • Practical Examples
  • Specialized Examples
  • Chapter Review
  • Chapter 12 Tools Inventory
  • Appendix A Objective Map
  • Objective Map: Exam PT0-002
  • Appendix B About the Online Content
  • System Requirements
  • Your Total Seminars Training Hub Account
  • Single User License Terms and Conditions
  • TotalTester Online
  • Other Book Resources
  • Technical Support
  • Glossary
  • Index
  • Data Exposure and Insecure Configuration
  • Inclusion Attacks
  • Race Conditions
  • Chapter Review
  • Chapter 6 Attacking the Cloud
  • Account and Privilege Attacks
  • Misconfigured Cloud Assets
  • Cloud-Centric Attacks
  • Chapter Review
  • Chapter 7 Specialized and Fragile Systems
  • Mobile Devices
  • Virtual and Containerized Systems
  • Other Nontraditional Systems
  • Chapter Review
  • Chapter 8 Social Engineering and Physical Attacks
  • Physical Security and Social Engineering
  • Social Engineering and Physical Attacks
  • Countermeasures
  • Chapter Review
  • References
  • Chapter 9 Post-Exploitation
  • Enumeration
  • Privilege Escalation
  • Covert Channels and Data Exfiltration
  • Lateral Movement
  • Maintaining Persistence
  • Covering Your Tracks
  • Chapter Review
  • Chapter 10 Post-Engagement Activities
  • The Anatomy of a Pentest Report
  • Findings, Recommendations, and Analysis
  • Post-Engagement Activities
  • Chapter Review
  • References
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Acknowledgments
  • Introduction
  • Chapter 1 Planning and Engagement
  • Governance, Risk, and Compliance
  • Testing Limitations
  • Contracts and Documentation
  • Scope and Requirements
  • Professionalism and Integrity
  • Chapter Review
  • References
  • Chapter 2 Information Gathering and Vulnerability Scanning
  • Passive Reconnaissance
  • Active Reconnaissance
  • Vulnerability Scanning and Analysis
  • Chapter Review
  • References
  • Chapter 3 Network-Based Attacks
  • Name Resolution Exploits
  • Password Attacks
  • Stress Testing Applications and Protocols
  • Network Packet Manipulation
  • Layer 2 Attacks
  • Researching an Attack
  • Chapter Review
  • Chapter 4 Wireless and RF Attacks
  • 802.11 Wireless
  • Attacking Bluetooth
  • RFID and NFC
  • Chapter Review
  • References
  • Chapter 5 Web and Database Attacks
  • OWASP Top Ten
  • Injection Attacks
  • Attacking Authentication and Session Management