Penetration Testing and Cisco Network Defense PDF ePub eBook

Books Info:

Penetration Testing and Cisco Network Defense free pdf The practical guide to simulating, detecting, and responding to network attacks * Create step-by-step testing plans * Learn to perform social engineering and host reconnaissance * Evaluate session hijacking methods * Exploit web server vulnerabilities * Detect attempts to breach database security * Use password crackers to obtain access information * Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches * Scan and penetrate wireless networks * Understand the inner workings of Trojan Horses, viruses, and other backdoor applications * Test UNIX, Microsoft, and Novell servers for vulnerabilities * Learn the root cause of buffer overflows and how to prevent them * Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems(R)

About Daniel P. Newman

Andrew Whitaker, CCSP , is the Director of Enterprise InfoSec and Networking for TechTrain, where he performs penetration tests and teaches ethical hacking and Cisco(R) courses. He has been working in the IT industry for more than ten years, specializing in Cisco and security technologies, and has performed penetration tests for numerous financial institutions and Fortune 500 companies. Daniel P. Newman, CISSP, CCSP, has been in the computer industry for over 12 years specializing in application programming, database design and network security for projects all over the world. He is the managing director and chief security officer for Tribal Knowledge Security and specializes in penetration testing and advanced technical training in Cisco, Microsoft, and Ethical Hacking topics.

Details Book

Author : Daniel P. Newman
Publisher : Cisco Press
Data Published : 31 October 2005
ISBN : 1587052083
EAN : 9781587052088
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 624 pages
Age + : 18 years
Language : English
Rating :

Reviews Penetration Testing and Cisco Network Defense



17 Comments Add a comment




Related eBooks Download


  • The Basics of Hacking and Penetration Testing free pdfThe Basics of Hacking and Penetration Testing

    "The Basics of Hacking and Penetration Testing" serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools- which are required to complete a penetration test..


  • Metasploit Toolkit for Penetration Testing free pdfMetasploit Toolkit for Penetration Testing

    This is the first book available for the Metasploit Framework (MSF). which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering..


  • Web Penetration Testing with Kali Linux free pdfWeb Penetration Testing with Kali Linux

    Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots..


  • Hacking and Penetration Testing with Low Power Devices free pdfHacking and Penetration Testing with Low Power Devices

    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small. low-powered devices that are easily hidden and may be battery-powered..


  • Penetration Testing with Perl free pdfPenetration Testing with Perl

    If you are an expert Perl programmer interested in penetration testing or information security. this guide is designed for you. However. it will also be helpful for you even if you have little or no Linux shell experience..


  • Penetration Testing and Cisco Network Defense free pdfPenetration Testing and Cisco Network Defense

    Download Ebooks Free ePub. The practical guide to simulating, detecting, and responding to network attacks * Create step-by-step testing plans * Learn to perform social engineering and host reconnais