In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading detection, chapter 13 detecting and targeting wireless, chapter 14 dealing with mobile device security, chapter 15 performing social engineering, chapter 16 hardening a host system, chapter 17 hardening your network, chapter 18 navigating the path to job success, chapter 19 building a test lab for penetration testing. |