Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition by Kevin Cardwell (2016, Trade Paperback)

AlibrisBooks (480356)
98,9% de votos positivos
Precio:
USD72,46
Aproximadamente62,36 EUR
+ USD19,87 de envío
Entrega prevista: lun. 3 nov. - jue. 13 nov.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Estado:
Nuevo
New Paperback

Acerca de este artículo

Product Identifiers

PublisherPackt Publishing, The Limited
ISBN-101785883496
ISBN-139781785883491
eBay Product ID (ePID)228989340

Product Key Features

Publication Year2016
SubjectSystem Administration / General, Security / General, Security / Networking
Number of Pages524 Pages
Publication NameBuilding Virtual Pentesting Labs for Advanced Penetration Testing-Second Edition
LanguageEnglish
TypeTextbook
Subject AreaComputers
AuthorKevin Cardwell
FormatTrade Paperback

Additional Product Features

Edition Number2
SynopsisWritten in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world.If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience., Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itAbout This Book* Explore and build intricate architectures that allow you to emulate an enterprise network* Test and enhance your security skills against complex and hardened virtual architecture* Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments.Who This Book Is ForWhile the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.What You Will Learn * Learning proven security testing and penetration testing techniques* Building multi-layered complex architectures to test the latest network designs* Applying a professional testing methodology* Determining whether there are filters between you and the target and how to penetrate them* Deploying and finding weaknesses in common firewall architectures.* Learning advanced techniques to deploy against hardened environments* Learning methods to circumvent endpoint protection controls In DetailSecurity flaws and new hacking techniques emerge overnight - security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams.Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams. Style and approach The book is written in an easy-to-follow format that provides a step-by-step, process-centric approach. Additionally, there are numerous hands-on examples and additional references for readers who might want to learn even more. The process developed throughout the book has been used to train and build teams all around the world as professional security and penetration testers.

Todos los anuncios de este producto

¡Cómpralo ya!selected
Cualquier estadoselected
Nuevo
Usado
Todavía no hay valoraciones ni opiniones.
Sé el primero en escribir una opinión.