Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)
CITATION
Nutting, Raymond
.
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)
. New York: McGraw-Hill Education, 2018.
Add to Favorites
Email to a Friend
Download Citation
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)
Authors:
Raymond Nutting
Published:
December 2018
Pages:
656
eISBN:
9781260135954
|
ISBN:
9781260135947
Open eBook
Book Description
Table of Contents
Cover
Title Page
Copyright Page
Dedication
Contents
Acknowledgments
Introduction
Objective Map: Exam PT0-001
Chapter 1 Pre-engagement Activities
Target Audience
Impact Analysis
Scope and Methodology
Contractual Agreements
Statement of Work
Chapter Review
Chapter 2 Getting to Know Your Targets
Footprinting and Reconnaissance
Tools, Methods, and Frameworks
Chapter Review
Chapter 3 Network Scanning and Enumeration
802.11 Wireless Standards
Wireless Testing Equipment
802.11 Network Discovery
Host Discovery
Port Scanning
Enumeration
Chapter Review
Chapter 4 Vulnerability Scanning and Analysis
Researching Vulnerabilities
Remote Security Scanning
Web and Database Scanning
Chapter Review
Chapter 5 Mobile Device and Application Testing
Mobile Device Architecture
Mobile Pentesting Fundamentals
iOS Application Security Testing
Android Application Security Testing
Software Assurance Testing
Chapter Review
Chapter 6 Social Engineering
Motivation Techniques
Social Engineering Attacks
Phishing
Countermeasures
Chapter Review
Chapter 7 Network-Based Attacks
Name Resolution Exploits
Stress Testing Applications and Protocols
Network Packet Manipulation
Layer-2 Attacks
Attacking Common Protocols
Chapter Review
Chapter 8 Wireless and RF Attacks
Wireless Encryption Standards
Wireless Attacks and Exploitation
Chapter Review
Chapter 9 Web and Database Attacks
Server-Side Attacks
Client-Side Attacks
Chapter Review
Chapter 10 Attacking Local Host Vulnerabilities
OS Vulnerabilities
Postexploitation
Privilege Escalation
Exploitable Services
Lateral Movement
Maintaining Persistence
Covering Your Tracks
Chapter Review
Chapter 11 Physical Penetration Testing
Keeping the Honest People Honest
Physical Device Security
Chapter Review
Chapter 12 Reporting and Communication
Writing the Pentest Report
Post-Report Delivery Activities
Communication Is Key
Chapter Review
Appendix About the Online Content
Glossary
Index