Penetration Testing For Dummies

Front Cover
John Wiley & Sons, May 19, 2020 - Computers - 256 pages

Target, test, analyze, and report on security vulnerabilities with pen testing

Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking.

Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.

  • The different phases of a pen test from pre-engagement to completion
  • Threat modeling and understanding risk
  • When to apply vulnerability management vs penetration testing
  • Ways to keep your pen testing skills sharp, relevant, and at the top of the game

Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction
3
An Overview Look at Pen Testing
23
Gathering Your Tools
39
UNDERSTANDING THE DIFFERENT
51
Penetrate and Exploit
53
Assumption Man in the Middle
69
and Disrupt DoSDDoS
79
Destroy Malware
93
Conducting a Penetration Test
129
Creating a Pen Test Report
147
Making Recommendations
161
Retesting
181
Ten Tips to Refine Your Pen Testing Skills
201
Ten Sites to Learn More About Pen Testing
209
Index
217
Penetration Testing For Dummies
218

Subvert Controls Bypass
103
Diving In Preparations and Testing
115

Other editions - View all

Common terms and phrases

About the author (2020)

Robert Shimonski is an ethical hacker and a professional IT leader who has led numerous efforts to architect, design, strategize and implement enterprise solutions that must remain secure. Rob has been involved in security and technology operations for over 25 years and has written his books from the trenches of experience.

Bibliographic information