CITATION

Nutting, Raymond. CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001). New York: McGraw-Hill Education, 2018.

CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)

Published:  December 2018 Pages: 656

eISBN: 9781260135954 | ISBN: 9781260135947
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Acknowledgments
  • Introduction
  • Objective Map: Exam PT0-001
  • Chapter 1 Pre-engagement Activities
  • Target Audience
  • Impact Analysis
  • Scope and Methodology
  • Contractual Agreements
  • Statement of Work
  • Chapter Review
  • Chapter 2 Getting to Know Your Targets
  • Footprinting and Reconnaissance
  • Tools, Methods, and Frameworks
  • Chapter Review
  • Chapter 3 Network Scanning and Enumeration
  • 802.11 Wireless Standards
  • Wireless Testing Equipment
  • 802.11 Network Discovery
  • Host Discovery
  • Port Scanning
  • Enumeration
  • Chapter Review
  • Chapter 4 Vulnerability Scanning and Analysis
  • Researching Vulnerabilities
  • Remote Security Scanning
  • Web and Database Scanning
  • Chapter Review
  • Chapter 5 Mobile Device and Application Testing
  • Mobile Device Architecture
  • Mobile Pentesting Fundamentals
  • iOS Application Security Testing
  • Android Application Security Testing
  • Software Assurance Testing
  • Chapter Review
  • Chapter 6 Social Engineering
  • Motivation Techniques
  • Social Engineering Attacks
  • Phishing
  • Countermeasures
  • Chapter Review
  • Chapter 7 Network-Based Attacks
  • Name Resolution Exploits
  • Stress Testing Applications and Protocols
  • Network Packet Manipulation
  • Layer-2 Attacks
  • Attacking Common Protocols
  • Chapter Review
  • Chapter 8 Wireless and RF Attacks
  • Wireless Encryption Standards
  • Wireless Attacks and Exploitation
  • Chapter Review
  • Chapter 9 Web and Database Attacks
  • Server-Side Attacks
  • Client-Side Attacks
  • Chapter Review
  • Chapter 10 Attacking Local Host Vulnerabilities
  • OS Vulnerabilities
  • Postexploitation
  • Privilege Escalation
  • Exploitable Services
  • Lateral Movement
  • Maintaining Persistence
  • Covering Your Tracks
  • Chapter Review
  • Chapter 11 Physical Penetration Testing
  • Keeping the Honest People Honest
  • Physical Device Security
  • Chapter Review
  • Chapter 12 Reporting and Communication
  • Writing the Pentest Report
  • Post-Report Delivery Activities
  • Communication Is Key
  • Chapter Review
  • Appendix About the Online Content
  • Glossary
  • Index