The Penetration Tester's Handbook: The First Steps to Ceh Certification

by
Edition: 1st
Format: Paperback
Pub. Date: 2016-10-22
Publisher(s): McGraw-Hill Education
Availability: This title is currently not available.
List Price: $60.00

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

This practical guide to penetration testing teaches would-be ethical hackers to scan for, identify, and analyze security vulnerabilities—readying readers for the Certified Ethical Hacker (CEH) exam

The Penetration Tester's Handbook: The First Steps to CEH Certification is designed to advance the knowledge, skills, and techniques of the ethical hacker. The book begins with a review of information security theory and goes on to fully cover the tools and techniques of penetration and vulnerability testing. Hands-on exercises are included throughout the handbook to reinforce the information presented and to develop your skills.

Upon finishing this handbook, you will be ready to practice independently to hone your penetration testing skills—and to work toward obtaining the Certified Ethical Hacker designation. The personal penetration testing lab, for which set-up instructions are included, will aid you beyond the book and serve as a resource for additional practice and study.

  • Bridges the knowledge and experience gap that exists between the CompTIA Security+ certification and the more advanced CEH certification
  • Features more than 30 realistic step-by-step practice exercises

Table of Contents

Chapter 1 Introduction to Pen Testing
Chapter 2 The Pen Testing Methodology
Chapter 3 Security Fundamentals
Chapter 4 Information Gathering Techniques
Chapter 5 Scanning and Enumeration
Chapter 6 Breaking and Entering a System
Chapter 7 Taking Control with Malware
Chapter 8 Leaving No Trace
Chapter 9 Detecting and Targeting Wireless
Chapter 10 Escaping and Evading Detection
Chapter 11 System Hardening
Chapter 12 Cryptogrpahy

Appendices
Appx A Building a Lab
Appx B A Selection of Tools
Appx C Museum of Attacks
Appx D Next Steps

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.