This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization’s computer systems. Key areas covered include: The primary phases of pen testing – reconnaissance, enumeration, vulnerability assessment and the eventual launch of an attack, The preparation of the test report – what information to include in the report and how best to present it to the client, The introduction of new technology – how it can improve business operations (e.g. employee remote access, wireless communications, public-facing web applications), but, at the same time, create new vulnerabilities.
Table of Contents
You are viewing the table of contents
You do not have access to this
on JSTOR. Try logging in through your institution for access.