Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems

Author:   Ric Messier
Publisher:   APress
Edition:   1st ed.
ISBN:  

9781484218563


Pages:   115
Publication Date:   15 July 2016
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $64.95 Quantity:  
Add to Cart

Share |

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems


Add your own review!

Overview

Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.  What You Will Learn Identify security vulnerabilities Use some of the top security tools to identify holes Read reports from testing tools Spot and negate common attacks Identify common Web-based attacks and exposures as well as recommendations for closing those holes Who This Book Is For Anyone who has some familiarity with computers and an interest in information security and penetration testing. 

Full Product Details

Author:   Ric Messier
Publisher:   APress
Imprint:   APress
Edition:   1st ed.
Dimensions:   Width: 15.50cm , Height: 0.70cm , Length: 23.50cm
Weight:   2.117kg
ISBN:  

9781484218563


ISBN 10:   1484218566
Pages:   115
Publication Date:   15 July 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1. What Is Penetration Testing?   Information Security    Penetration Testing vs Security Assessments    Who does Penetration Testing 2. Digging for Information   Google Hacking    Social Networking    Job Sites    Technical sources (e.g., regional Internet registries) 3. What’s Open?   Port scanning    Banner grabbing 4. Vulnerabilities   Scanning for vulnerabilities    Nessus vs Nexpose vs OpenVAS    Fuzzing 5. Exploitation   Using Metasploit    Exploit Database 6. Breaking Web Sites   Common Vulnerabilities<   Web Scanning 7. Reporting

Reviews

“This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art.” (L.-F. Pau, Computing Reviews, April, 2017)


This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art. (L.-F. Pau, Computing Reviews, April, 2017)


Author Information

Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College. Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies. An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security.  

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List