|
![]() |
|||
|
||||
OverviewPART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PART II - Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromising a System and Privilege Escalation Chapter 13: Maintaining Access Chapter 14: Covering Your Tracks PART III - Wrapping Everything Up Chapter 15: Reporting Results Chapter 16: Archiving Data Chapter 17: Cleaning Up Your Lab Chapter 18: Planning for Your Next PenTest Appendix A - Acronyms Appendix B - Definitions * Find out how to turn hacking and pen testing skills into a professional career * Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers * Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business * Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester * Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment Full Product DetailsAuthor: Thomas Wilhelm (Managing Director, Redstone Securities, USA) , Thomas Wilhelm (ISSMP, CISSP, SCSECA, and SCNA, Associate Professor at Colorado Technical University) , Thomas Wilhelm (ISSMP, CISSP, SCSECA, and SCNA, Associate Professor at Colorado Technical University) , Thomas Wilhelm (ISSMP, CISSP, SCSECA, and SCNA, Associate Professor at Colorado Technical University)Publisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 19.10cm , Height: 3.00cm , Length: 23.50cm Weight: 0.916kg ISBN: 9781597494250ISBN 10: 1597494259 Pages: 528 Publication Date: 23 September 2009 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9781597499934 Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviewsWilhelm has created the ultimate handbook for becoming a pen tester. This is going to help launch many a career. - Richard Stiennon, Chief Research Analyst, IT-Harvest Professional Penetration Testing covers everything from ethical concerns, to advance concepts, to setting up your own custom laboratory. It is the most comprehensive and authoritative guide at penetration testing that I have seen. Tom Wilhelm is a true expert in the field who not only is in the trenches on a daily basis, but also takes the time to instruct others on the ways and means of pen testing. -Frank Thornton, Owner, Blackthorn Systems Author InformationThomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI. Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master’s degrees in both Computer Science and Management. His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well. Tab Content 6Author Website:Countries AvailableAll regions |