Читать книгу CompTIA PenTest+ Certification For Dummies - Glen E. Clarke - Страница 3
CompTIA® PenTest+® Certification For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “CompTIA PenTest+ Certification For Dummies Cheat Sheet” in the Search box. Table of Contents
Оглавление1 Cover
4 Introduction About This Book Conventions Used in This Book Foolish Assumptions How This Book Is Organized Icons Used in This Book Beyond the Book Where to Go from Here
5 Pre-Assessment Questions Answers
6 Part 1: Planning and Information Gathering Chapter 1: Introduction to Penetration Testing Penetration Testing Overview Defining Penetration Testing Terminology Looking at CompTIA’s Penetration Testing Phases Reviewing Key Concepts Prep Test Answers Chapter 2: Planning and Scoping Understanding Key Legal Concepts Scoping the Project Identifying the Rules of Engagement Defining Targets for the Pentest Verifying Acceptance to Risk Scheduling the Pentest and Managing Scope Creep Conducting Compliance-based Assessments Reviewing Key Concepts Prep Test Answers Chapter 3: Information Gathering Looking at Information-Gathering Tools and Techniques Understanding Scanning and Enumeration Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 4: Vulnerability Identification Understanding Vulnerabilities Performing a Vulnerability Scan Analyzing Vulnerability Results Types of Weaknesses in Specialized Systems Lab Exercises Reviewing Key Concepts Prep Test Answers
7 Part 2: Attacks and Exploits Chapter 5: Exploiting Systems Exploiting Systems with Metasploit Understanding Social Engineering Looking at Attacks on Physical Security Common Attack Techniques Exploiting Network-Based Vulnerabilities Exploiting Local Host Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 6: Exploiting Wireless Vulnerabilities Understanding Wireless Terminology Introducing Wireless Standards Looking at Wireless Configuration and Troubleshooting Implementing Wireless Security Practices Exploiting Wireless Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 7: Exploiting Application-Based Vulnerabilities Looking at Common Application-Based Attacks Understanding Application Security Vulnerabilities Identifying Unsecure Coding Practices Secure Coding Best Practices Lab Exercises Reviewing Key Concepts Prep Test Answers
8 Part 3: Post-Exploitation and Reporting Chapter 8: Understanding Post-Exploitation Actions Common Post-Exploitation Tasks Performing Lateral Movement Maintaining Access (Persistence) Covering Your Tracks Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 9: Common Penetration Testing Tools Understanding Use Cases for Common Pentest Tools Looking at Common Pentest Tools Analyzing Tool Output Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 10: Analyzing Script Functionality Reviewing Scripting Concepts Using Bash Scripting Understanding Python Scripting Working with Ruby Scripting Coding in PowerShell Scripting Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 11: Reporting and Communication Communicating During a PenTest Findings and Remediations Focusing Your Remediation Strategies Writing and Handling the Pentest Report Delivering the Report and Post-Report Activities Lab Exercises Reviewing Key Concepts Prep Test Answers
9 Part 4: Appendixes Appendix A: PenTest+ Exam Details CompTIA PenTest+ Certification and Why You Need It Checking Out the Exam and Its Objectives Using This Book to Prepare for the Exam Making Arrangements to Take the Exam The Day the Earth Stood Still: Exam Day Appendix B: CompTIA PenTest+ Exam Reference Matrix 2018 PenTest+ Exam Objectives — PT0-001 Appendix C: Lab Setup Setting Up the Virtual Machines Obtaining the Software Needed
10 Index