Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by
CompTIA PenTest+ Certification For Dummies
Cover
Title Page
Copyright
Introduction
About This Book
Conventions Used in This Book
Foolish Assumptions
How This Book Is Organized
Icons Used in This Book
Beyond the Book
Where to Go from Here
Pre-Assessment
Questions
Answers
Part 1: Planning and Information Gathering
Chapter 1: Introduction to Penetration Testing
Penetration Testing Overview
Defining Penetration Testing Terminology
Looking at CompTIA’s Penetration Testing Phases
Reviewing Key Concepts
Prep Test
Answers
Chapter 2: Planning and Scoping
Understanding Key Legal Concepts
Scoping the Project
Identifying the Rules of Engagement
Defining Targets for the Pentest
Verifying Acceptance to Risk
Scheduling the Pentest and Managing Scope Creep
Conducting Compliance-based Assessments
Reviewing Key Concepts
Prep Test
Answers
Chapter 3: Information Gathering
Looking at Information-Gathering Tools and Techniques
Understanding Scanning and Enumeration
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 4: Vulnerability Identification
Understanding Vulnerabilities
Performing a Vulnerability Scan
Analyzing Vulnerability Results
Types of Weaknesses in Specialized Systems
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Part 2: Attacks and Exploits
Chapter 5: Exploiting Systems
Exploiting Systems with Metasploit
Understanding Social Engineering
Looking at Attacks on Physical Security
Common Attack Techniques
Exploiting Network-Based Vulnerabilities
Exploiting Local Host Vulnerabilities
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 6: Exploiting Wireless Vulnerabilities
Understanding Wireless Terminology
Introducing Wireless Standards
Looking at Wireless Configuration and Troubleshooting
Implementing Wireless Security Practices
Exploiting Wireless Vulnerabilities
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 7: Exploiting Application-Based Vulnerabilities
Looking at Common Application-Based Attacks
Understanding Application Security Vulnerabilities
Identifying Unsecure Coding Practices
Secure Coding Best Practices
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Part 3: Post-Exploitation and Reporting
Chapter 8: Understanding Post-Exploitation Actions
Common Post-Exploitation Tasks
Performing Lateral Movement
Maintaining Access (Persistence)
Covering Your Tracks
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 9: Common Penetration Testing Tools
Understanding Use Cases for Common Pentest Tools
Looking at Common Pentest Tools
Analyzing Tool Output
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 10: Analyzing Script Functionality
Reviewing Scripting Concepts
Using Bash Scripting
Understanding Python Scripting
Working with Ruby Scripting
Coding in PowerShell Scripting
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Chapter 11: Reporting and Communication
Communicating During a PenTest
Findings and Remediations
Focusing Your Remediation Strategies
Writing and Handling the Pentest Report
Delivering the Report and Post-Report Activities
Lab Exercises
Reviewing Key Concepts
Prep Test
Answers
Part 4: Appendixes
Appendix A: PenTest+ Exam Details
CompTIA PenTest+ Certification and Why You Need It
Checking Out the Exam and Its Objectives
Using This Book to Prepare for the Exam
Making Arrangements to Take the Exam
The Day the Earth Stood Still: Exam Day
Appendix B: CompTIA PenTest+ Exam Reference Matrix
2018 PenTest+ Exam Objectives — PT0-001
Appendix C: Lab Setup
Setting Up the Virtual Machines
Obtaining the Software Needed
Index
About the Author
Advertisement Page
Connect with Dummies
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Advertisement Page
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset