CompTIA PenTest+ certification all-in-one exam guide Exam PT0-002

This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetratio...

Descripción completa

Detalles Bibliográficos
Otros Autores: Linn, Heather, author (author), Nutting, Ray, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York, New York : McGraw Hill [2022]
Edición:2nd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009655516006719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Acknowledgments
  • Introduction
  • Chapter 1 Planning and Engagement
  • Governance, Risk, and Compliance
  • Testing Limitations
  • Contracts and Documentation
  • Scope and Requirements
  • Professionalism and Integrity
  • Chapter Review
  • References
  • Chapter 2 Information Gathering and Vulnerability Scanning
  • Passive Reconnaissance
  • Active Reconnaissance
  • Vulnerability Scanning and Analysis
  • Chapter Review
  • References
  • Chapter 3 Network-Based Attacks
  • Name Resolution Exploits
  • Password Attacks
  • Stress Testing Applications and Protocols
  • Network Packet Manipulation
  • Layer 2 Attacks
  • Researching an Attack
  • Chapter Review
  • Chapter 4 Wireless and RF Attacks
  • 802.11 Wireless
  • Attacking Bluetooth
  • RFID and NFC
  • Chapter Review
  • References
  • Chapter 5 Web and Database Attacks
  • OWASP Top Ten
  • Injection Attacks
  • Attacking Authentication and Session Management
  • Data Exposure and Insecure Configuration
  • Inclusion Attacks
  • Race Conditions
  • Chapter Review
  • Chapter 6 Attacking the Cloud
  • Account and Privilege Attacks
  • Misconfigured Cloud Assets
  • Cloud-Centric Attacks
  • Chapter Review
  • Chapter 7 Specialized and Fragile Systems
  • Mobile Devices
  • Virtual and Containerized Systems
  • Other Nontraditional Systems
  • Chapter Review
  • Chapter 8 Social Engineering and Physical Attacks
  • Physical Security and Social Engineering
  • Social Engineering and Physical Attacks
  • Countermeasures
  • Chapter Review
  • References
  • Chapter 9 Post-Exploitation
  • Enumeration
  • Privilege Escalation
  • Covert Channels and Data Exfiltration
  • Lateral Movement
  • Maintaining Persistence
  • Covering Your Tracks
  • Chapter Review
  • Chapter 10 Post-Engagement Activities
  • The Anatomy of a Pentest Report
  • Findings, Recommendations, and Analysis
  • Post-Engagement Activities
  • Chapter Review
  • References
  • Chapter 11 Tools and Code Analysis
  • Logic Constructs
  • Data Structures
  • Other Programming Concepts
  • Practical Examples
  • Specialized Examples
  • Chapter Review
  • Chapter 12 Tools Inventory
  • Appendix A Objective Map
  • Objective Map: Exam PT0-002
  • Appendix B About the Online Content
  • System Requirements
  • Your Total Seminars Training Hub Account
  • Single User License Terms and Conditions
  • TotalTester Online
  • Other Book Resources
  • Technical Support
  • Glossary
  • Index.