CISO's Guide to Penetration Testing

Book description

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview o

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Foreword
  6. Chapter 1: Getting Started (1/2)
  7. Chapter 1: Getting Started (2/2)
  8. Chapter 2: Setting the Stage (1/6)
  9. Chapter 2: Setting the Stage (2/6)
  10. Chapter 2: Setting the Stage (3/6)
  11. Chapter 2: Setting the Stage (4/6)
  12. Chapter 2: Setting the Stage (5/6)
  13. Chapter 2: Setting the Stage (6/6)
  14. Chapter 3: The Framework (1/3)
  15. Chapter 3: The Framework (2/3)
  16. Chapter 3: The Framework (3/3)
  17. Chapter 4 (1/6)
  18. Chapter 4 (2/6)
  19. Chapter 4 (3/6)
  20. Chapter 4 (4/6)
  21. Chapter 4 (5/6)
  22. Chapter 4 (6/6)
  23. Chapter 5 (1/14)
  24. Chapter 5 (2/14)
  25. Chapter 5 (3/14)
  26. Chapter 5 (4/14)
  27. Chapter 5 (5/14)
  28. Chapter 5 (6/14)
  29. Chapter 5 (7/14)
  30. Chapter 5 (8/14)
  31. Chapter 5 (9/14)
  32. Chapter 5 (10/14)
  33. Chapter 5 (11/14)
  34. Chapter 5 (12/14)
  35. Chapter 5 (13/14)
  36. Chapter 5 (14/14)
  37. Chapter 6: Preparing for a Hack (1/6)
  38. Chapter 6: Preparing for a Hack (2/6)
  39. Chapter 6: Preparing for a Hack (3/6)
  40. Chapter 6: Preparing for a Hack (4/6)
  41. Chapter 6: Preparing for a Hack (5/6)
  42. Chapter 6: Preparing for a Hack (6/6)
  43. Chapter 7: Reconnaissance (1/7)
  44. Chapter 7: Reconnaissance (2/7)
  45. Chapter 7: Reconnaissance (3/7)
  46. Chapter 7: Reconnaissance (4/7)
  47. Chapter 7: Reconnaissance (5/7)
  48. Chapter 7: Reconnaissance (6/7)
  49. Chapter 7: Reconnaissance (7/7)
  50. Chapter 8: Enumeration (1/4)
  51. Chapter 8: Enumeration (2/4)
  52. Chapter 8: Enumeration (3/4)
  53. Chapter 8: Enumeration (4/4)
  54. Chapter 9: Vulnerability Analysis (1/4)
  55. Chapter 9: Vulnerability Analysis (2/4)
  56. Chapter 9: Vulnerability Analysis (3/4)
  57. Chapter 9: Vulnerability Analysis (4/4)
  58. Chapter 10: Exploitation (1/8)
  59. Chapter 10: Exploitation (2/8)
  60. Chapter 10: Exploitation (3/8)
  61. Chapter 10: Exploitation (4/8)
  62. Chapter 10: Exploitation (5/8)
  63. Chapter 10: Exploitation (6/8)
  64. Chapter 10: Exploitation (7/8)
  65. Chapter 10: Exploitation (8/8)
  66. Chapter 11: The Deliverable (1/8)
  67. Chapter 11: The Deliverable (2/8)
  68. Chapter 11: The Deliverable (3/8)
  69. Chapter 11: The Deliverable (4/8)
  70. Chapter 11: The Deliverable (5/8)
  71. Chapter 11: The Deliverable (6/8)
  72. Chapter 11: The Deliverable (7/8)
  73. Chapter 11: The Deliverable (8/8)
  74. Chapter 12: Integrating the Results (1/10)
  75. Chapter 12: Integrating the Results (2/10)
  76. Chapter 12: Integrating the Results (3/10)
  77. Chapter 12: Integrating the Results (4/10)
  78. Chapter 12: Integrating the Results (5/10)
  79. Chapter 12: Integrating the Results (6/10)
  80. Chapter 12: Integrating the Results (7/10)
  81. Chapter 12: Integrating the Results (8/10)
  82. Chapter 12: Integrating the Results (9/10)
  83. Chapter 12: Integrating the Results (10/10)
  84. Back Cover

Product information

  • Title: CISO's Guide to Penetration Testing
  • Author(s): James S. Tiller
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439880289