CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition
- Length: 576 pages
- Edition: 2
- Language: English
- Publisher: Sybex
- Publication Date: 2021-11-02
- ISBN-10: 1119823811
- ISBN-13: 9781119823810
- Sales Rank: #1210279 (See Top 100 Books)
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing
In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field.
You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You’ll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques.
This book will:
- Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam
- Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements
- Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms
Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.
Cover Table of Contents Title Page Copyright Dedication Acknowledgments About the Author About the Technical Editor Introduction CompTIA The PenTest+ Exam What Does This Book Cover? CompTIA PenTest+ Certification Exam Objectives Assessment Test Answers to Assessment Test Chapter 1: Penetration Testing What Is Penetration Testing? Reasons for Penetration Testing Who Performs Penetration Tests? The CompTIA Penetration Testing Process The Cyber Kill Chain Tools of the Trade Summary Exam Essentials Lab Exercises Review Questions Chapter 2: Planning and Scoping Penetration Tests Scoping and Planning Engagements Penetration Testing Standards and Methodologies Key Legal Concepts for Penetration Tests Regulatory Compliance Considerations Summary Exam Essentials Lab Exercises Review Questions Chapter 3: Information Gathering Footprinting and Enumeration Active Reconnaissance and Enumeration Information Gathering and Defenses Summary Exam Essentials Lab Exercises Review Questions Chapter 4: Vulnerability Scanning Identifying Vulnerability Management Requirements Configuring and Executing Vulnerability Scans Software Security Testing Developing a Remediation Workflow Overcoming Barriers to Vulnerability Scanning Summary Exam Essentials Lab Exercises Review Questions Chapter 5: Analyzing Vulnerability Scans Reviewing and Interpreting Scan Reports Validating Scan Results Common Vulnerabilities Summary Exam Essentials Lab Exercises Review Questions Chapter 6: Exploiting and Pivoting Exploits and Attacks Exploitation Toolkits Exploit Specifics Leveraging Exploits Persistence and Evasion Pivoting Covering Your Tracks Summary Exam Essentials Lab Exercises Review Questions Chapter 7: Exploiting Network Vulnerabilities Identifying Exploits Conducting Network Exploits Exploiting Windows Services Identifying and Exploiting Common Services Wireless Exploits Summary Exam Essentials Lab Exercises Review Questions Chapter 8: Exploiting Physical and Social Vulnerabilities Physical Facility Penetration Testing Social Engineering Summary Exam Essentials Lab Exercises Review Questions Chapter 9: Exploiting Application Vulnerabilities Exploiting Injection Vulnerabilities Exploiting Authentication Vulnerabilities Exploiting Authorization Vulnerabilities Exploiting Web Application Vulnerabilities Unsecure Coding Practices Steganography Application Testing Tools Summary Exam Essentials Lab Exercises Review Questions Chapter 10: Attacking Hosts, Cloud Technologies, and Specialized Systems Attacking Hosts Credential Attacks and Testing Tools Remote Access Attacking Virtual Machines and Containers Attacking Cloud Technologies Attacking Mobile Devices Attacking IoT, ICS, Embedded Systems, and SCADA Devices Attacking Data Storage Summary Exam Essentials Lab Exercises Review Questions Chapter 11: Reporting and Communication The Importance of Communication Recommending Mitigation Strategies Writing a Penetration Testing Report Wrapping Up the Engagement Summary Exam Essentials Lab Exercises Review Questions Chapter 12: Scripting for Penetration Testing Scripting and Penetration Testing Variables, Arrays, and Substitutions Comparison Operations String Operations Flow Control Input and Output (I/O) Error Handling Advanced Data Structures Reusing Code The Role of Coding in Penetration Testing Summary Exam Essentials Lab Exercises Review Questions Appendix A: Answers to Review Questions Appendix B: Solution to Lab Exercise Solution to Activity 5.2: Analyzing a CVSS Vector Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.