Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Glen E. Clarke
CompTIA PenTest+ Certification For Dummies
Читать книгу CompTIA PenTest+ Certification For Dummies - Glen E. Clarke - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
76
Оглавление
Купить и скачать книгу
Вернуться на страницу книги CompTIA PenTest+ Certification For Dummies
Оглавление
Страница 1
Страница 2
CompTIA® PenTest+® Certification For Dummies® To view this book's Cheat Sheet, simply go to
www.dummies.com
and search for “CompTIA PenTest+ Certification For Dummies Cheat Sheet” in the Search box. Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 8
Страница 9
Страница 10
Страница 11
Introduction to Penetration Testing
Penetration Testing Overview
Reasons for a pentest
Who should perform a pentest
Internal staff
External third party
Qualified pentesters
How often a pentest should be performed
Regular schedule
After major changes
Other considerations
Defining Penetration Testing Terminology
Types of assessments
Pentest strategies
Threat actors and threat models
Capabilities and intent
Threat actor
Adversary tier
Threat modeling
Looking at CompTIA’s Penetration Testing Phases
Planning and scoping
Information gathering and vulnerability identification
Information gathering
Vulnerability identification
Attacks and exploits
Reporting and communication
Reviewing Key Concepts
Prep Test
Answers
Страница 41
Planning and Scoping
Understanding Key Legal Concepts
Written authorization
Contracts
Disclaimers
Scoping the Project
General questions
Web application testing questions
Wireless network testing questions
Physical security testing questions
Social engineering testing questions
Testing questions for IT staff
Identifying the Rules of Engagement
Target audience and reason for the pentest
Communication escalation path
Resources and requirements
Confidentiality of findings
Known versus unknown
Support for the pentester
Budget
Impact analysis and remediation timelines
Defining Targets for the Pentest
Internal and external targets
First-party versus third-party hosted
Other targets
Target considerations
Verifying Acceptance to Risk
Scheduling the Pentest and Managing Scope Creep
Scheduling
Scope creep
Conducting Compliance-based Assessments
Reviewing Key Concepts
Prep Test
Answers
{buyButton}
Подняться наверх