Request for consultation
Your form is submitting...
Overview
Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps students gain the knowledge and skills necessary to analyze systems in the same way hackers do, to identify vulnerabilities and to reduce security risks. All the information needed to successfully pass the CompTIA PenTest+ PTO-002 certification exam is included in this text. It contains detailed examples, projects, and hands-on activities where students can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing and the second module of the book walks students through the process of building their own penetration testing lab of virtual machines. The final module of the course brings everything together with a final project, which guides the reader in the creation of a penetration testing report that includes all the areas covered in earlier modules.
- Module objectives -- Each module begins with a detailed list of the concepts to master. This list gives you a quick reference to the module’s contents and serves as a useful study aid.
- Figures and tables -- Numerous screenshots show you how to use security tools, including command-line tools, and how to create programs. In addition, a variety of diagrams aid you in visualizing important concepts. Tables present information in an organized, easy-to-grasp manner.
- Hands-on activities -- One of the best ways to reinforce learning about network security and security testing is to practice using the many tools security testers use. Hands-on activities are interspersed throughout each module to give you practice in applying what you have learned.
- A Penetration Testing Lab -- Module 2 walks you through the process of building a lab of virtual machines, hosted on your own computer, that is used for practicing the use of pen testing tools and methodologies.
- Notes -- Notes draw your attention to helpful material related to the subject being covered. In addition, notes with the title “Security Bytes” offer real-world examples related to security topics in each module.
- Tips -- Tips offer extra information on resources and how to solve problems.
- Caution -- Caution icons warn you about potential mistakes or problems and explain how to avoid them.
- Module summary -- Each module ends with a summary of the concepts introduced in the module. These summaries are a helpful way to review the material covered in each module.
- Key terms -- All terms in the module introduced with bold text are gathered together in the key terms list at the end of the module. This useful reference encourages a more thorough understanding of the module’s key concepts. A full definition of each key term is provided in the Glossary.
- Review questions -- The end-of-module assessment begins with review questions that reinforce the main concepts and techniques covered in each module. Answering these questions helps ensure that you have mastered important topics.
- Case projects -- Each module closes with one or more case projects that help you evaluate and apply the material you have learned. To complete these projects, you must draw on real-world common sense as well as your knowledge of the technical topics covered to that point in the course. Your goal for each project is to come up with answers to problems similar to those you’ll face as a working security tester. To help you with this goal, many case projects are based on a hypothetical company typical of those hiring security consultants.
- Final Project -- The final module of the course brings everything together with a final project, which guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.
2. Setting Up a Penetration Testing Lab.
3. Planning and Scoping.
4. Information Gathering.
5. Performing Vulnerability Scanning.
6. Exploitation Methods and Tools.
7. Network Attacks and Attack Vectors.
8. Wireless and Specialized Systems Attack Vectors and Attacks.
9. Application-Based Attack Vectors and Attacks.
10. Host Attack Vectors and Cloud Technologies Attacks.
11. Social Engineering and Physical Attacks.
12. Reporting and Communication.
13. Writing and Understanding Code.
14. The Final Penetration Testing Project.
Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.
FOR STUDENTS
MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 2 terms Instant Access
ISBN: 9780357445297
MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 1st Edition, is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course -- to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You.
MindTap gives you complete ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the eBook.
All MindTap activities and assignments are tied to the learning objectives. The live virtual machine labs allow students to practice, explore and try different solutions in a safe, sandbox environment using real Cisco hardware and virtualized Windows, Linux and UNIX operating systems.
Readings and projects give balanced coverage to prepare students to become future network security professionals. Security for Life assignments inspire students to stay current with new and emerging technologies. Pre- and post-exams offer scenario-based questions and allow you to measure how much students have learned using analytics and reporting that make it easy to see where the class stands in terms of progress, engagement and completion rates. Auto-graded module quizzes also help you gauge students' mastery of the course topics.
Use the content and learning path as-is, or pick and choose how the material will wrap around your own content. You control what the students see and when they see it.