CompTIA PenTest+ certification all-in-one exam guide Exam PT0-002
This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetratio...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York, New York :
McGraw Hill
[2022]
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009655516006719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Planning and Engagement
- Governance, Risk, and Compliance
- Testing Limitations
- Contracts and Documentation
- Scope and Requirements
- Professionalism and Integrity
- Chapter Review
- References
- Chapter 2 Information Gathering and Vulnerability Scanning
- Passive Reconnaissance
- Active Reconnaissance
- Vulnerability Scanning and Analysis
- Chapter Review
- References
- Chapter 3 Network-Based Attacks
- Name Resolution Exploits
- Password Attacks
- Stress Testing Applications and Protocols
- Network Packet Manipulation
- Layer 2 Attacks
- Researching an Attack
- Chapter Review
- Chapter 4 Wireless and RF Attacks
- 802.11 Wireless
- Attacking Bluetooth
- RFID and NFC
- Chapter Review
- References
- Chapter 5 Web and Database Attacks
- OWASP Top Ten
- Injection Attacks
- Attacking Authentication and Session Management
- Data Exposure and Insecure Configuration
- Inclusion Attacks
- Race Conditions
- Chapter Review
- Chapter 6 Attacking the Cloud
- Account and Privilege Attacks
- Misconfigured Cloud Assets
- Cloud-Centric Attacks
- Chapter Review
- Chapter 7 Specialized and Fragile Systems
- Mobile Devices
- Virtual and Containerized Systems
- Other Nontraditional Systems
- Chapter Review
- Chapter 8 Social Engineering and Physical Attacks
- Physical Security and Social Engineering
- Social Engineering and Physical Attacks
- Countermeasures
- Chapter Review
- References
- Chapter 9 Post-Exploitation
- Enumeration
- Privilege Escalation
- Covert Channels and Data Exfiltration
- Lateral Movement
- Maintaining Persistence
- Covering Your Tracks
- Chapter Review
- Chapter 10 Post-Engagement Activities
- The Anatomy of a Pentest Report
- Findings, Recommendations, and Analysis
- Post-Engagement Activities
- Chapter Review
- References
- Chapter 11 Tools and Code Analysis
- Logic Constructs
- Data Structures
- Other Programming Concepts
- Practical Examples
- Specialized Examples
- Chapter Review
- Chapter 12 Tools Inventory
- Appendix A Objective Map
- Objective Map: Exam PT0-002
- Appendix B About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Single User License Terms and Conditions
- TotalTester Online
- Other Book Resources
- Technical Support
- Glossary
- Index.