|
![]() |
|||
|
||||
OverviewPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Covers every topic on the exam, including: Pre-engagement and planning activities Reconnaissance and open source intelligence gathering Scanning, enumerating targets, and identifying vulnerabilities Exploiting targets and privilege escalation Password attacks Post-exploitation activities, including data exfiltration and pivoting PowerShell for penetration testing Web application injection attacks Tools of the trade: Metasploit, proxies, and more Online content includes: 230 accurate practice exam questions Test engine containing full-length practice exams and customizable quizzes Full Product DetailsAuthor: Raymond Nutting , William MacCormackPublisher: McGraw-Hill Education Imprint: McGraw-Hill Education Weight: 0.721kg ISBN: 9781260456745ISBN 10: 1260456749 Pages: 480 Publication Date: 16 December 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsChapter 1: Penetration Testing Fundamentals Chapter 2: Pre-Engagement Activity Chapter 3: Penetration Testing Lab Setup Chapter 4: Reconnaissance, Open Source Intelligence (OSINT) Chapter 5: Scanning, Enumerating Targets and Vulnerabilities Chapter 6: Exploiting Targets Chapter 7: Advanced Metasploit Chapter 8: Password Attacks Chapter 9: Stealing Data, Maintaining Access and Pivoting Chapter 10: PowerShell for Penetration Testing Chapter 11: Web Application Hacking Chapter 12: Proxies, Crawlers, and Spiders Chapter 13: OWASP Top 10 Appendix A: Tools ReferenceReviewsAuthor InformationRaymond Nutting, CompTIA PenTest+(TM), CISSP-ISSEP, is a published author and security practitioner with over 20 years of experience in the field of information security. He is the co-owner and founder of nDepth Security, a managed security service provider that specializes in penetration testing. Ray holds numerous industry-recognized certifications and has presented at various conferences and events throughout his career. William MacCormack, GPEN, GSE, is a reformed systems administrator who has worked in IT for over 15 years and is currently a penetration tester for a small cybersecurity firm located in Columbia, MD. He currently teaches penetration testing at a local community college and in his free time mentors high school students beginning their cybersecurity education. Tab Content 6Author Website:Countries AvailableAll regions |