CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition

  • 9h 57m
  • David Seidl, Mike Chapple
  • Sybex
  • 2021

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing

In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field.

You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You’ll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques.

This book will:

  • Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam
  • Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements
  • Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms

Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.

In this Book

  • Introduction
  • Chapter 1: Penetration Testing
  • Chapter 2: Planning and Scoping Penetration Tests
  • Chapter 3: Information Gathering
  • Chapter 4: Vulnerability Scanning
  • Chapter 5: Analyzing Vulnerability Scans
  • Chapter 6: Exploiting and Pivoting
  • Chapter 7: Exploiting Network Vulnerabilities
  • Chapter 8: Exploiting Physical and Social Vulnerabilities
  • Chapter 9: Exploiting Application Vulnerabilities
  • Chapter 10: Attacking Hosts, Cloud Technologies, and Specialized Systems
  • Chapter 11: Reporting and Communication
  • Chapter 12: Scripting for Penetration Testing
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Rating 4.4 of 11 users Rating 4.4 of 11 users (11)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE