December 2020
Intermediate to advanced
304 pages
8h 57m
English
Adversarial attack simulation: Penetration testing
When a penetration test is least effective
When does a company really need a penetration test?
Executing a network penetration test
Phase 1: Information gathering
Phase 3: Post-exploitation and privilege escalation
Setting up your lab environment
The Capsulecorp Pentest project
Building your own virtual pentest platform