Search Results - "penetration test"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 24
- Penetration testing (Computer security) 22
- Security measures 21
- Computer security 20
- Hackers 10
- Examinations 8
- Computer crimes 7
- Certification 6
- Electronic data processing personnel 6
- Computers 5
- Prevention 5
- access control 5
- Computer hackers 4
- Hacking 4
- Mobile computing 2
- Soil mechanics 2
- Soil penetration test 2
- Testing 2
- security measures 2
- Access control 1
- Browsers (Computer programs) 1
- Computer software 1
- Congresses 1
- Cyberspace 1
- Economic aspects 1
- Electronic data processing departments 1
- Embedded computer systems 1
- Evaluation 1
- Mobile communication systems 1
- Moral and ethical aspects 1
-
1
Penetration testing in the UK proceedings of the geotechnology conference organized by the Institution of Civil Engineers and held in Birmingham on 6-8 July 1988
Published 1989Subjects: “…Soil penetration test Congresses…”
Book -
2
-
3
Advanced penetration testing hacking the world's most secure networks
Published 2017Subjects: “…Penetration testing (Computer security)…”
Book -
4
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
Published 2013Table of Contents: “…What is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Social engineering -- Web Based Exploitation -- Post Exploitation and Maintaining Access with Backdoors, Rootkits, and meterpreter -- Wrapping Up the Penetration Test.…”
Book -
5
-
6
Cone penetration testing in geotechnical practice
Published 1997Table of Contents: “…Geo-Environmental Applications of Penetration Testing -- 9. Examples -- 10. Future Trends -- App. …”
Book -
7
-
8
-
9
Hacking with kali practical penetration testing techniques
Published 2014Table of Contents: “…ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary.…”
Book -
10
Ninja hacking unconventional penetration testing tactics and techniques
Published 2011Subjects: “…Penetration testing (Computer security)…”
Book -
11
-
12
Computer and information security handbook
Published 2013Subjects: “…Penetration testing (Computer security).…”
Book -
13
Computer and information security handbook
Published 2009Subjects: “…Penetration testing (Computer security)…”
Book -
14
Learn ethical hacking from scratch your stepping stone to penetration testing
Published 2018Subjects: “…Penetration testing (Computer security)…”
Book -
15
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
Published 2017Subjects: “…Penetration testing (Computer security).…”
Book -
16
Learning Kali Linux security testing, penetration testing, and ethical hacking
Published 2018Subjects: “…Penetration testing (Computer security)…”
Book -
17
Hands-on ethical hacking and network defense
Published 2021Subjects: “…Penetration testing (Computer security)…”
Book -
18
Software test attacks to break mobile and embedded devices
Published 2017Subjects: “…Penetration testing (Computer security)…”
Book -
19
Certified ethical hacker (CEH) version 9 cert guide
Published 2017Subjects: “…Penetration testing (Computer security)…”
Book -
20
Network scanning cookbook practical network security using Nmap and Nessus 7
Published 2018Subjects: “…Penetration testing (Computer security)…”
Book


