Back to Search
ISBN 9781070135748 is currently unpriced. Please contact us for pricing.
Available options are listed below:

CompTIA Pentest+: Brief guide to help you for your CompTIA exam preparation

AUTHOR Brown, Nicholas
PUBLISHER Independently Published (08/05/2019)
PRODUCT TYPE Paperback (Paperback)

Description
The use of ICT in companies and organizations is on the rise today. Each company relies on more than one ICT systems for their operations. The reason behind this is that ICT improves the ease through which individuals access company services and information. It has also made it easy for companies to deliver services to their customers. For instance, an individual can know the services offered by a company and even contact them from the company's website. Companies use computer networks as a way of transferring data from one department to another. Computer networks are also used for communication between the company and outsiders. Companies rely on database management systems for storage of data about their customers and staff.Despite the advantages brought about by the use of ICT systems, they present a threat to the company if they are not well secured. Hackers can take advantage of the security loopholes associated with such systems to gain illegal access into the sensitive data belonging to the company. If this happens, the company will incur huge loses, including being sued, losing customers and even being closed. The company members of staff should be trained on how to handle sensitive data of the organization, including sensitive credentials such as passwords. If this is not done, they may be tricked into revealing them by external hackers through social engineering attacks. This book is an excellent guide for anyone who wants to learn the practice of penetration testing. The author guides you on how to perform penetration tests on various ICT systems used by organizations today. Enjoy reading

This book will help you to understand:

- What is Penetration Testing?

- Planning and Scoping a Penetration Test

- Knowing the Targets and Vulnerability Assessment

- Social Engineering Penetration Testing

- Pen Testing Wired and Wireless Networks

- Pen Testing Databases

- Pen Testing Web Applications

- Pen Testing Firewalls

Tags: comptia pentest+, information technology, sql database, communication technology, computer networks, penetrations, database management systems, nmap network scanning, sql server, web server, http server, html beginner, schema therapy.

Show More
Product Format
Product Details
ISBN-13: 9781070135748
ISBN-10: 1070135747
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 72
Carton Quantity: 114
Product Dimensions: 6.00 x 0.15 x 9.00 inches
Weight: 0.24 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Database Administration & Management
Descriptions, Reviews, Etc.
publisher marketing
The use of ICT in companies and organizations is on the rise today. Each company relies on more than one ICT systems for their operations. The reason behind this is that ICT improves the ease through which individuals access company services and information. It has also made it easy for companies to deliver services to their customers. For instance, an individual can know the services offered by a company and even contact them from the company's website. Companies use computer networks as a way of transferring data from one department to another. Computer networks are also used for communication between the company and outsiders. Companies rely on database management systems for storage of data about their customers and staff.Despite the advantages brought about by the use of ICT systems, they present a threat to the company if they are not well secured. Hackers can take advantage of the security loopholes associated with such systems to gain illegal access into the sensitive data belonging to the company. If this happens, the company will incur huge loses, including being sued, losing customers and even being closed. The company members of staff should be trained on how to handle sensitive data of the organization, including sensitive credentials such as passwords. If this is not done, they may be tricked into revealing them by external hackers through social engineering attacks. This book is an excellent guide for anyone who wants to learn the practice of penetration testing. The author guides you on how to perform penetration tests on various ICT systems used by organizations today. Enjoy reading

This book will help you to understand:

- What is Penetration Testing?

- Planning and Scoping a Penetration Test

- Knowing the Targets and Vulnerability Assessment

- Social Engineering Penetration Testing

- Pen Testing Wired and Wireless Networks

- Pen Testing Databases

- Pen Testing Web Applications

- Pen Testing Firewalls

Tags: comptia pentest+, information technology, sql database, communication technology, computer networks, penetrations, database management systems, nmap network scanning, sql server, web server, http server, html beginner, schema therapy.

Show More
Paperback