Showing 1 - 20 results of 560 for search '"penetration test"', query time: 0.08s Refine Results
  1. 1

    Penetration testing : protecting networks and systems / by Henry, Kevin M.

    Published 2012
    Table of Contents: “…Introduction; Chapter 1: Introduction to Penetration Testing; Case study; Security basics; Risk management; The threat environment; Overview of the steps to penetration testing; Penetration testing versus hacking; Benefits of penetration testing; Summary; Key learning points; Questions; Chapter 2: Preparing to Conduct a Penetration Test; Approval and scope; Planning; Summary; Questions; Chapter 3: Reconnaissance; The start of the test; Physical information gathering; Other data sources; Avoiding footprinting; Key learning points; Questions; Chapter 4: Active Reconnaissance and Enumeration.…”
    CONNECT
    CONNECT
    CONNECT
    Electronic eBook
  2. 2

    Penetration testing : a hands-on introduction to hacking / by Weidman, Georgia

    Published 2014
    Table of Contents: “…A Note of Thanks / Peter Van Eeckhoutte -- About This Book / Peter Van Eeckhoutte -- Part I: The Basics / Peter Van Eeckhoutte -- Part II: Assessments / Peter Van Eeckhoutte -- Part III: Attacks / Peter Van Eeckhoutte -- Part IV: Exploit Development / Peter Van Eeckhoutte -- Part V: Mobile Hacking / Peter Van Eeckhoutte -- 0. Penetration Testing Primer / Peter Van Eeckhoutte -- The Stages of the Penetration Test / Peter Van Eeckhoutte -- Pre-engagement / Peter Van Eeckhoutte -- Information Gathering / Peter Van Eeckhoutte -- Threat Modeling / Peter Van Eeckhoutte -- Vulnerability Analysis / Peter Van Eeckhoutte -- Exploitation / Peter Van Eeckhoutte -- Post Exploitation / Peter Van Eeckhoutte -- Reporting / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 1. …”
    CONNECT
    Electronic eBook
  3. 3

    Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. by Velu, Vijay Kumar

    Published 2016
    Subjects: “…Penetration testing (Computer security)…”
    CONNECT
    Electronic eBook
  4. 4

    Penetration testing : a guide for business and it managers.

    Published 2019
    Subjects: “…Penetration testing (Computer security)…”
    CONNECT
    CONNECT
    Electronic eBook
  5. 5

    Penetration Testing with Metasploit.

    Published 2021
    CONNECT
    Electronic Video
  6. 6
  7. 7
  8. 8

    Penetration testing essentials. by Oriyano, Sean-Philip

    Published 2017
    Table of Contents: “…Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence…”
    CONNECT
    Electronic eBook
  9. 9
  10. 10

    Penetration Testing For Dummies / by Shimonski, Robert

    Published 2020
    CONNECT
    Electronic eBook
  11. 11

    AWS Penetration Testing / by Helmus, Jonathan

    Published 2021
    CONNECT
    Electronic eBook
  12. 12

    Advanced penetration testing : hacking the world's most secure networks / by Allsopp, Wil

    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    CONNECT
    Electronic eBook
  13. 13

    Penetration testing essentials / by Oriyano, Sean-Philip

    Published 2017
    Table of Contents: “…Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence…”
    CONNECT
    Electronic eBook
  14. 14

    Learning Penetration Testing.

    Published 2023
    CONNECT
    Electronic Video
  15. 15

    Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills. by Pillay, Rishalin

    Published 2019
    Table of Contents: “…Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Section 1: The Basics; Chapter 1: Introduction to Penetration Testing; Technical requirements; What is penetration testing?…”
    CONNECT
    Electronic eBook
  16. 16

    AWS Penetration Testing : Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap. by Helmus, Jonathan

    Published 2020
    Table of Contents: “…Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Setting Up AWS and Pentesting Environments -- Chapter 1: Building Your AWS Environment -- Technical requirements -- Exploring Amazon Web Services (AWS) -- AWS security and penetration testing -- Understanding our testing environment -- Configuring your environment -- Setting up an account -- Setting up EC2 instances -- Setting up an EC2 instance with CentOS -- Setting up a Windows host -- Attacker setup -- setting up a Kali instance -- Connecting with PuTTY…”
    CONNECT
    Electronic eBook
  17. 17

    Cone penetration testing / by Mayne, Paul W.

    Published 2007
    Subjects: “…Soil penetration test.…”
    CONNECT
    Book
  18. 18
  19. 19

    Penetration testing bootcamp : quickly get up and running with pentesting techniques / by Beltrame, Jason

    Published 2017
    Table of Contents: “…Planning and Preparation -- Information Gathering -- Setting up and maintaining the Command and Control Server -- Vulnerability Scanning and Metasploit -- Traffic Sniffing and Spoofing -- Password-based Attacks -- Attacks on the Network Infrastructure -- Web Application Attacks -- Cleaning Up and Getting Out -- Writing Up the Penetration Testing Report.…”
    CONNECT
    CONNECT
    Electronic eBook
  20. 20

    The penetrometer and soil exploration / by Sanglerat, Guy, 1924-

    Published 1982
    Subjects: “…Soil penetration test.…”
    CONNECT
    Electronic eBook