The benefit of the CSSLP certification for educators and professionals
Journal of Computing Sciences in Colleges
Secure by Design: Developing Secure Software Systems from the Ground Up
International Journal of Secure Software Engineering
Hi-index | 0.00 |
PART I - Setting UpChapter 1: IntroductionChapter 2: Ethics and HackingChapter 3: Hacking as a CareerChapter 4: Setting up Your LabChapter 5: Creating and Using PenTest Targets in Your LabChapter 6: MethodologiesChapter 7: PenTest MetricsChapter 8: Management of a PenTestPART II - Running a PenTestChapter 9: Information GatheringChapter 10: Vulnerability IdentificationChapter 11: Vulnerability VerificationChapter 12: Compromising a System and Privilege EscalationChapter 13: Maintaining AccessChapter 14: Covering Your TracksPART III - Wrapping Everything UpChapter 15: Reporting ResultsChapter 16: Archiving DataChapter 17: Cleaning Up Your LabChapter 18: Planning for Your Next PenTestAppendix A - AcronymsAppendix B - Definitions Find out how to turn hacking and pen testing skills into a professional careerUnderstand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable serversMaster project management skills necessary for running a formal penetration test and setting up a professional ethical hacking businessDiscover metrics and reporting methodologies that provide experience crucial to a professional penetration testerLearn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment