Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments
Code Files

Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Lee Allen, Kevin Cardwell

1 customer reviews
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments
Mapt Subscription
FREE
$29.99/m after trial
eBook
$10.00
RRP $47.99
Save 79%
Print + eBook
$59.99
RRP $59.99
What do I get with a Mapt subscription?
  • Unlimited access to all Packt’s 6,000+ eBooks and Videos
  • 100+ new titles a month, learning paths, assessments & code files
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$10.00
$59.99
$29.99 p/m after trial
RRP $47.99
RRP $59.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Advanced Penetration Testing for Highly-Secured Environments - Second Edition Book Cover
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
$ 47.99
$ 10.00
Learning Penetration Testing with Python Book Cover
Learning Penetration Testing with Python
$ 39.99
$ 10.00
Buy 2 for $20.00
Save $67.98
Add to Cart

Book Details

ISBN 139781784395810
Paperback428 pages

Book Description

The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes.

The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected!

The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get!

Table of Contents

What You Will Learn

  • A step-by-step methodology to identify and penetrate secured environments
  • Get to know the process to test network services across enterprise architecture when defences are in place
  • Grasp different web application testing methods and how to identify web application protections that are deployed
  • Understand a variety of concepts to exploit software
  • Gain proven post-exploitation techniques to exfiltrate data from the target
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defences
  • Be the first to find out the latest methods to bypass firewalls
  • Follow proven approaches to record and save the data from tests for analysis

Authors

Table of Contents

Book Details

ISBN 139781784395810
Paperback428 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Learning Penetration Testing with Python Book Cover
Learning Penetration Testing with Python
$ 39.99
$ 10.00
Mastering Metasploit - Second Edition Book Cover
Mastering Metasploit - Second Edition
$ 39.99
$ 10.00
Applied Network Security Book Cover
Applied Network Security
$ 35.99
$ 10.00
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition Book Cover
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
$ 47.99
$ 10.00
Mastering Kali Linux for Advanced Penetration Testing - Second Edition Book Cover
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
$ 39.99
$ 10.00
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition Book Cover
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition
$ 35.99
$ 10.00