Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

  • Authors:
  • Thomas Wilhelm

  • Affiliations:
  • -

  • Venue:
  • Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

PART I - Setting UpChapter 1: IntroductionChapter 2: Ethics and HackingChapter 3: Hacking as a CareerChapter 4: Setting up Your LabChapter 5: Creating and Using PenTest Targets in Your LabChapter 6: MethodologiesChapter 7: PenTest MetricsChapter 8: Management of a PenTestPART II - Running a PenTestChapter 9: Information GatheringChapter 10: Vulnerability IdentificationChapter 11: Vulnerability VerificationChapter 12: Compromising a System and Privilege EscalationChapter 13: Maintaining AccessChapter 14: Covering Your TracksPART III - Wrapping Everything UpChapter 15: Reporting ResultsChapter 16: Archiving DataChapter 17: Cleaning Up Your LabChapter 18: Planning for Your Next PenTestAppendix A - AcronymsAppendix B - Definitions Find out how to turn hacking and pen testing skills into a professional careerUnderstand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable serversMaster project management skills necessary for running a formal penetration test and setting up a professional ethical hacking businessDiscover metrics and reporting methodologies that provide experience crucial to a professional penetration testerLearn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment