Part 2

Understanding the Different Types of Pen Testing

IN THIS PART …

Get at overview of attack vectors and the different types of attack types as well as encryption and cryptology.

Learn about advanced persistent threats (APT) and how they lead to other assumption attacks, such as Man in the Middle (MiTM).

Discover how attackers can overwhelm and disrupt networks with Denial of Service (DoS) and distributed denial of service (DDoS) attacks.

Explore the various types of destroy attacks — those meant to destroy a company’s assets.

Go in depth with subvert attacks; they’re how hackers can sneak past controls undetected.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.202.187