Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Glen E. Clarke
CompTIA Pentest+ Certification For Dummies
Читать книгу CompTIA Pentest+ Certification For Dummies - Glen E. Clarke - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
90
Оглавление
Купить и скачать книгу
Вернуться на страницу книги CompTIA Pentest+ Certification For Dummies
Оглавление
Страница 1
Страница 2
CompTIA® Pentest+® Certification For Dummies® Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 8
Страница 9
Страница 10
Страница 11
Introduction to Penetration Testing
Penetration Testing Overview
Reasons for a pentest
Who should perform a pentest
Internal staff
External third party
Qualified pentesters
How often a pentest should be performed
Regular schedule
After major changes
Other considerations
Defining Penetration Testing Terminology
Types of assessments
Pentest strategy
Threat actors and threat models
Capabilities and intent
Threat actor
Adversary tier
Threat modeling
Looking at CompTIA’s Penetration Testing Phases
Planning and scoping
Information gathering and vulnerability identification
Information gathering
Vulnerability identification
Attacks and exploits
Reporting and communication
Identifying Testing Standards and Methodologies
MITRE ATT&CK
Open Web Application Security Project (OWASP)
OWASP Top 10 (2017)
OWASP Top 10 (2021)
National Institute of Standards and Technology (NIST)
OSSTMM, PTES, and ISSAF
Reviewing Key Concepts
Prep Test
Answers
Страница 48
Planning and Scoping
Understanding Key Legal Concepts
Written authorization
Contracts and agreements
Disclaimers
Scoping the Project
Target list/in-scope assets
General questions
Web application testing questions
Wireless network testing questions
Physical security testing questions
Social engineering testing questions
Testing questions for IT staff
Identifying the Rules of Engagement (RoE)
Environmental considerations
Target audience and reason for the pentest
Communication escalation path
Resources and requirements
Confidentiality of findings
Known versus unknown
Support for the pentester
Budget
Impact analysis and remediation timelines
Defining Targets for the Pentest
Internal and external targets
First-party versus third-party hosted
Other targets
Target considerations
Verifying Acceptance to Risk
Scheduling the Pentest and Managing Scope Creep
Scheduling
Scope creep
Conducting Compliance-based Assessments
Considerations with compliance-based assessments
Restrictions with compliance-based assessments
Validate scope of engagement
Maintaining professionalism and integrity
Risks to the professional
Reviewing Key Concepts
Prep Test
Answers
{buyButton}
Подняться наверх