Читать книгу CompTIA Pentest+ Certification For Dummies - Glen E. Clarke - Страница 3

CompTIA® Pentest+® Certification For Dummies® Table of Contents

Оглавление

Cover

Title Page

Copyright

Introduction About This Book Conventions Used in This Book Foolish Assumptions How This Book Is Organized Icons Used in This Book Beyond the Book Where to Go from Here

Pre-Assessment Questions Answers

Part 1: Planning and Information Gathering Chapter 1: Introduction to Penetration Testing Penetration Testing Overview Defining Penetration Testing Terminology Looking at CompTIA’s Penetration Testing Phases Identifying Testing Standards and Methodologies Reviewing Key Concepts Prep Test Answers Chapter 2: Planning and Scoping Understanding Key Legal Concepts Scoping the Project Identifying the Rules of Engagement (RoE) Defining Targets for the Pentest Verifying Acceptance to Risk Scheduling the Pentest and Managing Scope Creep Conducting Compliance-based Assessments Reviewing Key Concepts Prep Test Answers Chapter 3: Information Gathering Looking at Information-Gathering Tools and Techniques Understanding Scanning and Enumeration Detection Methods and Tokens Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 4: Vulnerability Identification Understanding Vulnerabilities Performing a Vulnerability Scan Analyzing Vulnerability Results Attacks and Weaknesses in Specialized Systems Lab Exercises Reviewing Key Concepts Prep Test Answers

Part 2: Attacks and Exploits Chapter 5: Exploiting Systems Exploiting Systems with Metasploit Understanding Social Engineering Looking at Attacks on Physical Security Common Attack Techniques Exploiting Network-Based Vulnerabilities Exploiting Local-Host Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 6: Exploiting Wireless Vulnerabilities Understanding Wireless Terminology Introducing Wireless Standards Looking at Wireless Configuration and Troubleshooting Implementing Wireless Security Practices Exploiting Wireless Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 7: Exploiting Application-Based Vulnerabilities Looking at Common Application-Based Attacks Understanding Application Security Vulnerabilities Common Coding Mistakes Secure Coding Best Practices Common Tools and Resources Lab Exercises Reviewing Key Concepts Prep Test Answers

Part 3: Post-Exploitation and Reporting Chapter 8: Understanding Post-Exploitation Actions Common Post-Exploitation Tasks Performing Lateral Movement Maintaining Access (Persistence) Covering Your Tracks Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 9: Common Penetration Testing Tools Understanding Use Cases for Common Pentest Tools Looking at Common Pentest Tools Analyzing Tool Output Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 10: Analyzing Script Functionality Reviewing Scripting Concepts Using Bash Scripting Understanding Python Scripting Working with Ruby Scripting Coding in PowerShell Scripting Code Examples and Automation Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 11: Reporting and Communication Communicating During a PenTest Findings and Remediations Focusing Your Remediation Strategies Recommending the Appropriate Remediation Strategy Writing and Handling the Pentest Report Delivering the Report and Post-Report Activities Lab Exercises Reviewing Key Concepts Prep Test Answers

Part 4: Appendixes Appendix A: PenTest+ Exam Details CompTIA PenTest+ Certification and Why You Need It Checking Out the Exam and Its Objectives Using This Book to Prepare for the Exam Steps to Prepare for the Exam Making Arrangements to Take the Exam The Day the Earth Stood Still: Exam Day Appendix B: CompTIA PenTest+ Exam Reference Matrix 2021 PenTest+ Exam Objectives — PTO-002 Appendix C: Lab Setup Setting Up the Virtual Machines Obtaining the Software Needed

10  Index

11  About the Author

12  Connect with Dummies

13  End User License Agreement

CompTIA Pentest+ Certification For Dummies

Подняться наверх