CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002)
- 7h 54m
- Heather Linn, Raymond Nutting
- McGraw-Hill/Osborne
- 2022
This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam.
Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-002 from this comprehensive resource. Written by expert penetration testers, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
Covers all exam topics, including:
- Planning and engagement
- Information gathering
- Vulnerability scanning
- Network-based attacks
- Wireless and radio frequency attacks
- Web and database attacks
- Cloud attacks
- Specialized and fragile systems
- Social Engineering and physical attacks
- Post-exploitation tools and techniques
- Post-engagement activities
- Tools and code analysis
- And more
Online content includes:
- 170 practice exam questions
- Interactive performance-based questions
- Test engine that provides full-length practice exams or customizable quizzes by chapter or exam objective
About the Author
Heather Linn, CompTIA PenTest+, has over 20 years in the security industry and has held roles in corporate security, penetration testing, and as part of a hunt team. She has served as the technical editor for CompTIA PenTest+ Certification All-in-One Exam Guide, First Edition, CompTIA PenTest+ Certification Practice Exams, and Gray Hat Hacking, Fifth Edition. She is the author of CompTIA PenTest+ Passport.
Raymond Nutting, CompTIA PenTest+™, CISSP-ISSEP, is a published author and security practitioner with over 20 years of experience in the field of information security. He is the co-owner and founder of nDepth Security, a managed security service provider that specializes in penetration testing. Ray holds numerous industry-recognized certifications and has presented at various conferences and events throughout his career.
In this Book
-
Introduction
-
Planning and Engagement
-
Information Gathering and Vulnerability Scanning
-
Network-Based Attacks
-
Wireless and RF Attacks
-
Web and Database Attacks
-
Attacking the Cloud
-
Specialized and Fragile Systems
-
Social Engineering and Physical Attacks
-
Post-Exploitation
-
Post-Engagement Activities
-
Tools and Code Analysis
-
Tools Inventory
-
Appendix A Objective Map
-
Appendix B About the Online Content
-
Glossary