GPEN GIAC Certified Penetration Tester All-in-One Exam Guide

GPEN GIAC Certified Penetration Tester All-in-One Exam Guide

Author: Raymond Nutting

Publisher: McGraw Hill Professional

Published: 2020-11-05

Total Pages: 481

ISBN-13: 1260456757

DOWNLOAD EBOOK

This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Covers every topic on the exam, including: Pre-engagement and planning activities Reconnaissance and open source intelligence gathering Scanning, enumerating targets, and identifying vulnerabilities Exploiting targets and privilege escalation Password attacks Post-exploitation activities, including data exfiltration and pivoting PowerShell for penetration testing Web application injection attacks Tools of the trade: Metasploit, proxies, and more Online content includes: 230 accurate practice exam questions Test engine containing full-length practice exams and customizable quizzes


GCIH GIAC Certified Incident Handler All-in-One Exam Guide

GCIH GIAC Certified Incident Handler All-in-One Exam Guide

Author: Nick Mitropoulos

Publisher: McGraw Hill Professional

Published: 2020-08-21

Total Pages: 464

ISBN-13: 1260461637

DOWNLOAD EBOOK

This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a recognized cybersecurity expert and seasoned author, GCIH GIAC Certified Incident Handler All-in-One Exam Guide clearly explains all of the advanced security incident handling skills covered on the test. Detailed examples and chapter summaries throughout demonstrate real-world threats and aid in retention. You will get online access to 300 practice questions that match those on the live test in style, format, and tone. Designed to help you prepare for the exam, this resource also serves as an ideal on-the-job reference. Covers all exam topics, including: Intrusion analysis and incident handling Information gathering Scanning, enumeration, and vulnerability identification Vulnerability exploitation Infrastructure and endpoint attacks Network, DoS, and Web application attacks Maintaining access Evading detection and covering tracks Worms, bots, and botnets Online content includes: 300 practice exam questions Test engine that provides full-length practice exams and customizable quizzes


CISSP Study Guide

CISSP Study Guide

Author: Eric Conrad

Publisher: Syngress

Published: 2015-12-08

Total Pages: 624

ISBN-13: 0128028203

DOWNLOAD EBOOK

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more joining their ranks, this new third edition presents everything a reader needs to know on the newest version of the exam's Common Body of Knowledge. The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions. Provides the most complete and effective study guide to prepare users for passing the CISSP exam, giving them exactly what they need to pass the test Authored by Eric Conrad who has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals Covers all of the new information in the Common Body of Knowledge updated in January 2015, and also provides two exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix


GSEC GIAC Security Essentials Certification All-in-One Exam Guide

GSEC GIAC Security Essentials Certification All-in-One Exam Guide

Author: Ric Messier

Publisher: McGraw Hill Professional

Published: 2013-11-01

Total Pages: 634

ISBN-13: 0071820906

DOWNLOAD EBOOK

"All-in-One Is All You Need." Get complete coverage of all the objectives on Global Information Assurance Certification's Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Networking fundamentals Network design Authentication and access control Network security Linux and Windows Encryption Risk management Virtual machines Vulnerability control Malware Physical security Wireless technologies VoIP ELECTRONIC CONTENT FEATURES: TWO PRACTICE EXAMS AUTHOR VIDEOS PDF eBOOK


Penetration Testing For Dummies

Penetration Testing For Dummies

Author: Robert Shimonski

Publisher: John Wiley & Sons

Published: 2020-03-27

Total Pages: 260

ISBN-13: 1119577470

DOWNLOAD EBOOK

Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!


Eleventh Hour CISSP

Eleventh Hour CISSP

Author: Joshua Feldman

Publisher: Elsevier

Published: 2013-10-16

Total Pages: 214

ISBN-13: 0124171451

DOWNLOAD EBOOK

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam's Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam. - All-new Second Edition updated for the most current version of the exam's Common Body of Knowledge - The only guide you need for last minute studying - Answers the toughest questions and highlights core topics - No fluff - streamlined for maximum efficiency of study – perfect for professionals who are updating their certification or taking the test for the first time


CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)

CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)

Author: Raymond Nutting

Publisher: McGraw-Hill Education

Published: 2018-12-05

Total Pages: 0

ISBN-13: 9781260135947

DOWNLOAD EBOOK

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ exam Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive resource. Written by an expert penetration tester, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth answer explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: • Pre-engagement activities • Getting to know your targets • Network scanning and enumeration • Vulnerability scanning and analysis • Mobile device and application testing • Social engineering • Network-based attacks • Wireless and RF attacks • Web and database attacks • Attacking local operating systems • Physical penetration testing • Writing the pen test report • And more Online content includes: • Interactive performance-based questions • Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain • Downloadable virtual machine files for use with some of the exercises in the book • Penetration Testing Tools and References appendix


Fiela's Child

Fiela's Child

Author: Dalene Matthee

Publisher: University of Chicago Press

Published: 1992-09

Total Pages: 361

ISBN-13: 0226510832

DOWNLOAD EBOOK

Set in nineteenth-century rural Africa, Fiela's Child tells the gripping story of Fiela Komoetie and a white, three-year old child, Benjamin, whom she finds crying on her doorstep. For nine years Fiela raises Benjamin as one of her own children. But when census takers discover Benjamin, they send him to an illiterate white family of woodcutters who claim him as their son. What follows is Benjamin's search for his identity and the fundamental changes affecting the white and black families who claim him. "Everything a novel can be: convincing, thought-provoking, upsetting, unforgettable, and timeless."—Grace Ingoldby, New Statesman "Fiela's Child is a parade that broadens and humanizes our understanding of the conflicts still affecting South Africa today."—Francis Levy, New York Times Book Review "A powerful creation of time and place with dark threads of destiny and oppression and its roots in the almost Biblical soil of a storyteller's art."—Christopher Wordsworth, The Guardian "The characters in the novel live and breathe; and the landscape is so brightly painted that the trees, birds, elephants, and rivers of old South Africa are characters themselves. A book not to miss."—Kirkus Reviews


Learn Ethical Hacking from Scratch

Learn Ethical Hacking from Scratch

Author: Zaid Sabih

Publisher: Packt Publishing Ltd

Published: 2018-07-31

Total Pages: 549

ISBN-13: 1788624785

DOWNLOAD EBOOK

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is for Learning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.