Get Free Shipping on orders over $79
Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers - Chiheb Chebbi

Advanced Infrastructure Penetration Testing

Defend your systems from methodized and proficient attackers

By: Chiheb Chebbi

Paperback | 23 February 2018

At a Glance

Paperback


$71.75

or 4 interest-free payments of $17.94 with

 or 

Ships in 5 to 7 business days

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts, Active Directory delegation, and CRON jobs Practical use cases to deliver an intelligent endpoint-protected system

Book Description It has always been difficult to gain

hands-on experience and a comprehensive

understanding of advanced penetration

testing techniques and vulnerability

assessment and management. This

book will be your one-stop solution to

compromising complex network devices

and modern operating systems. This book

provides you with advanced penetration

testing techniques that will help you exploit

databases, web and application servers,

switches or routers, Docker, VLAN, VoIP,

and VPN.

With this book, you will explore exploitation

abilities such as offensive PowerShell

tools and techniques, CI servers, database

exploitation, Active Directory delegation,

kernel exploits, cron jobs, VLAN hopping,

and Docker breakouts. Moving on, this

book will not only walk you through

managing vulnerabilities, but will also teach

you how to ensure endpoint protection.

Toward the end of this book, you will also

discover post-exploitation tips, tools, and

methodologies to help your organization

build an intelligent security system.

By the end of this book, you will have

mastered the skills and methodologies

needed to breach infrastructures and

provide complete endpoint protection for

your system.

What you will learn

Exposure to advanced infrastructure penetration testing techniques and methodologies Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation Understand what it takes to break into enterprise networks Learn to secure the configuration management environment and continuous delivery pipeline Gain an understanding of how to exploit networks and IoT devices Discover real-world, post-exploitation techniques and countermeasures

Who this book is for If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

More in Data Encryption

Crypto Engine Design : Cyber Shorts - Wen-Long Chin
Crypto Engine Design : Cyber Shorts - Wen-Long Chin
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF