CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition

  • 9h 57m
  • David Seidl, Mike Chapple
  • Sybex
  • 2021

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing

In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field.

You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You’ll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques.

This book will:

  • Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam
  • Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements
  • Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms

Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.

In this Book

  • Introduction
  • Chapter 1: Penetration Testing
  • Chapter 2: Planning and Scoping Penetration Tests
  • Chapter 3: Information Gathering
  • Chapter 4: Vulnerability Scanning
  • Chapter 5: Analyzing Vulnerability Scans
  • Chapter 6: Exploiting and Pivoting
  • Chapter 7: Exploiting Network Vulnerabilities
  • Chapter 8: Exploiting Physical and Social Vulnerabilities
  • Chapter 9: Exploiting Application Vulnerabilities
  • Chapter 10: Attacking Hosts, Cloud Technologies, and Specialized Systems
  • Chapter 11: Reporting and Communication
  • Chapter 12: Scripting for Penetration Testing
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.2 of 107 users Rating 4.2 of 107 users (107)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)