Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

CompTIA PenTest+ PT0-002 Cert Guide

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2022
ISBN13: 9780137566136
Rubricering
Juridisch :
Pearson Education e druk, 2022 9780137566136
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Learn, prepare, and practice for CompTIA PenTest+ PT0-002 exam success with this CompTIA PenTest+ PT0-002 Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

CompTIA PenTest+ PT0-002 Cert Guide presents students with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow students to decide how much time they need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help students drill on key concepts they must know thoroughly.

CompTIA PenTest+ PT0-002 Cert Guide focuses specifically on the objectives for the CompTIA PenTest+ PT0-002 exam. Leading security expert Omar Santos shares preparation hints and test-taking tips, helping students identify areas of weakness and improve both their conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing their understanding and retention of exam topics.

This complete study package includes: A test-preparation routine proven to help students pass the exams Do I Know This Already? quizzes, which allow students to decide how much time they need to spend on each section Chapter-ending exercises, which help students drill on key concepts that must be known thoroughly An online interactive Flash Cards application to help students drill on Key Terms by chapter A final preparation chapter, which guides students through tools and resources to help students craft their review and test-taking strategies Study plan suggestions and templates to help students organize and optimize their study time

Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps students master the concepts and techniques that ensure their exam success.

This study guide helps students master all the topics on the CompTIA PenTest+ PT0-002 exam, including: Planning and Scoping a Penetration Testing Assessment Information Gathering and Vulnerability Identification Social Engineering Attacks and Physical Security Vulnerabilities Exploiting Wired and Wireless Networks Exploiting Application-Based Vulnerabilities Cloud, Mobile, and IoT Security Performing Post-Exploitation Techniques Reporting and Communication Tools and Code Analysis

Specificaties

ISBN13:9780137566136
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

<div> Introduction xxix </div> <div> <br> </div> <div> Chapter 1 Introduction to Ethical Hacking and Penetration Testing 3 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 3 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 7 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Ethical Hacking and Penetration Testing 7 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploring Penetration Testing Methodologies 9 </div> <div> <br> </div> <div> &nbsp; &nbsp; Building Your Own Lab 15 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 20 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 20 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 20 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 20 </div> <div> <br> </div> <div> Chapter 2 Planning and Scoping a Penetration Testing Assessment 23 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 23 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 26 </div> <div> <br> </div> <div> &nbsp; &nbsp; Comparing and Contrasting Governance, Risk, and Compliance Concepts 26 </div> <div> <br> </div> <div> &nbsp; &nbsp; Explaining the Importance of Scoping and Organizational or Customer Requirements 39 </div> <div> <br> </div> <div> &nbsp; &nbsp; Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity 48 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 50 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 50 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 51 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 51 </div> <div> <br> </div> <div> Chapter 3 Information Gathering and Vulnerability Scanning 55 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 55 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 59 </div> <div> <br> </div> <div> &nbsp; &nbsp; Performing Passive Reconnaissance 59 </div> <div> <br> </div> <div> &nbsp; &nbsp; Performing Active Reconnaissance 93 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding the Art of Performing Vulnerability Scans 125 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding How to Analyze Vulnerability Scan Results 136 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 141 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 142 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 142 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 143 </div> <div> <br> </div> <div> Chapter 4 Social Engineering Attacks 145 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 145 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 149 </div> <div> <br> </div> <div> &nbsp; &nbsp; Pretexting for an Approach and Impersonation 149 </div> <div> <br> </div> <div> &nbsp; &nbsp; Social Engineering Attacks 151 </div> <div> <br> </div> <div> &nbsp; &nbsp; Physical Attacks 155 </div> <div> <br> </div> <div> &nbsp; &nbsp; Methods of Influence 170 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 171 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 171 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 172 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 172 </div> <div> <br> </div> <div> Chapter 5 Exploiting Wired and Wireless Networks 175 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 175 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 180 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Network-Based Vulnerabilities 180 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Wireless Vulnerabilities 216 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 234 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 234 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 235 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 235 </div> <div> <br> </div> <div> Chapter 6 Exploiting Application-Based Vulnerabilities 237 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 237 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 244 </div> <div> <br> </div> <div> &nbsp; &nbsp; Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10 244 </div> <div> <br> </div> <div> &nbsp; &nbsp; How to Build Your Own Web Application Lab 255 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Business Logic Flaws 256 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Injection-Based Vulnerabilities 257 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Authentication-Based Vulnerabilities 273 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Authorization-Based Vulnerabilities 279 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Cross-Site Scripting (XSS) Vulnerabilities 281 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks 288 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Clickjacking 289 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Security Misconfigurations 289 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting File Inclusion Vulnerabilities 292 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exploiting Insecure Code Practices 293 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 301 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 301 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 302 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 303 </div> <div> <br> </div> <div> Chapter 7 Cloud, Mobile, and IoT Security 305 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 305 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 309 </div> <div> <br> </div> <div> &nbsp; &nbsp; Researching Attack Vectors and Performing Attacks on Cloud Technologies 309 </div> <div> <br> </div> <div> &nbsp; &nbsp; Explaining Common Attacks and Vulnerabilities Against Specialized Systems 324 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 336 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 337 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 337 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 338 </div> <div> <br> </div> <div> Chapter 8 Performing Post-Exploitation Techniques 341 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 341 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 345 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating a Foothold and Maintaining Persistence After Compromising a System 345 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration 355 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 371 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 371 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 372 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 372 </div> <div> <br> </div> <div> Chapter 9 Reporting and Communication 375 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 375 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 379 </div> <div> <br> </div> <div> &nbsp; &nbsp; Comparing and Contrasting Important Components of Written Reports 379 </div> <div> <br> </div> <div> &nbsp; &nbsp; Analyzing the Findings and Recommending the Appropriate Remediation Within a Report 385 </div> <div> <br> </div> <div> &nbsp; &nbsp; Explaining the Importance of Communication During the Penetration Testing Process 390 </div> <div> <br> </div> <div> &nbsp; &nbsp; Explaining Post-Report Delivery Activities 393 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 395 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 395 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 395 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 396 </div> <div> <br> </div> <div> Chapter 10 Tools and Code Analysis 399 </div> <div> <br> </div> <div> &nbsp; &nbsp; “Do I Know This Already?” Quiz 399 </div> <div> <br> </div> <div> &nbsp; &nbsp; Foundation Topics 403 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding the Basic Concepts of Scripting and Software </div> <div> <br> </div> <div> &nbsp; &nbsp; Development 403 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code 409 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exam Preparation Tasks 505 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review All Key Topics 506 </div> <div> <br> </div> <div> &nbsp; &nbsp; Define Key Terms 508 </div> <div> <br> </div> <div> &nbsp; &nbsp; Q&amp;A 508 </div> <div> <br> </div> <div> Chapter 11 Final Preparation 513 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tools for Final Preparation 513 </div> <div> <br> </div> <div> &nbsp; &nbsp; Suggested Plan for Final Review/Study 517 </div> <div> <br> </div> <div> &nbsp; &nbsp; Summary 518 </div> <div> <br> </div> <div> Glossary of Key Terms 519 </div> <div> <br> </div> <div> Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&amp;A Sections 537 </div> <div> <br> </div> <div> Appendix B CompTIA® PenTest+ PT0-002 Cert Guide Exam Updates 559 </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> Online Elements: </div> <div> <br> </div> <div> Appendix C Study Planner </div> <div> <br> </div> <div> Glossary of Key Terms </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> TOC, 9780137566068, 10/21/2021 </div> <div> <br> </div> <div> <br> </div>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CompTIA PenTest+ PT0-002 Cert Guide