Skip to Main Content
Select regional store:
Learn for less: Save 10% on high-quality foundation and auditor training. Find out more
Penetration Testing: Protecting Networks and Systems

Penetration Testing - Protecting Networks and Systems

SKU: 3823
Authors: Kevin M. Henry
Publishers:  IT Governance Publishing
Format: ePub
ISBN13: 9781849283731
Pages: 234
Published: 21 Jun 2012
Availability: Always Available
Format: PDF
ISBN13: 9781849283724
Pages: 221
Published: 21 Jun 2012
Availability: Always Available
Format: Kindle
ISBN13: 9781849284202
Pages: 221
Published: 06 Jul 2012
  • Introduces the concepts and techniques used in penetration testing, giving readers an understanding of the principles of ethical hacking.
  • Covers the topics required for the Certified Penetration Testing Engineer (CPTE) examination, making it a handy study guide for anyone preparing to take the exam.
  • Buy this guide today and gain a solid understanding of the principles and practice of penetration testing.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service center team on +1 877 317 3454.

Price: $31.99

The fundamentals of penetration testing explained

In this book, the author covers the penetration test process: reconnaissance, enumeration, vulnerability assessment, and the eventual launch of an attack. He explains how to prepare the test report, focusing on what information to include in the report and how best to present it to the client.

The book also discusses the potential dangers of new technology adopted to improve business operations (e.g. employee remote access, wireless communications, public-facing web applications) but, at the same time, creating new vulnerabilities.

Focusing on the techniques

Avoiding a detailed, technical analysis of the tools currently used by today’s pen testers, which often come in and out of fashion, the book instead focuses on the range of techniques employed by professional pen testers. The author draws on his wealth of experience and provides real-world examples to give readers a practical understanding of how to conduct a penetration test. He also explains how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels.


  1. Introduction to Penetration Testing
  2. Preparing to Conduct a Penetration Test
  3. Reconnaissance
  4. Active Reconnaissance and Enumeration
  5. Vulnerability Assessments
  6. Hacking Windows and UNIX
  7. Launching the Attack
  8. Attacking Web Applications
  9. Preparing the Report
About the author

Kevin Henry

Kevin Henry has 35 years’ experience working on computer systems, initially as an operator on the largest mini-computer installation in Canada and then in various programmer and analyst roles, before moving into computer audit and security. Kevin provides security auditing, training, and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit.

Customer reviews

This website uses cookies. View our cookie policy