Skip to main content
Apress
Book cover

Penetration Testing Basics

A Quick-Start Guide to Breaking into Systems

  • Book
  • © 2016

Overview

  • Short and to the point practical hands-on type of book

  • Quick starting point to get someone right into penetration testing

  • Quick, guided tours of important security tools

  • Focus on remediation strategies and not just breaking things

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (7 chapters)

Keywords

About this book

Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. 


What You Will Learn
  • Identify security vulnerabilities
  • Use some of the top security tools to identify holes
  • Read reports from testing tools
  • Spot and negate common attacks
  • Identify common Web-based attacks and exposures as well as recommendations for closing those holes

Who This Book Is For


Anyone who has some familiarity with computers and an interest in information security and penetration testing. 





Reviews

“This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art.” (L.-F. Pau, Computing Reviews, April, 2017)

Authors and Affiliations

  • Winooski, USA

    Ric Messier

About the author

Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College.


Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies.


An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security. 
 

Bibliographic Information

Publish with us