The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

by Brand: Syngress

AED 119

Retail Price:AED 180
You Save:33%

Order now to get it by: Tuesday August 01 - Thursday August 03

Expedited Shipping available

Get it on Saturday July 29th with expedited shipping.

Select the expedited delivery option after adding this item to your cart.

Condition: New

Product ID: 286867

Delivery Information |Returns & Exchanges |Payment Methods


  • Used Book in Good Condition
  • The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a
    penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn
    how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a
    penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation,
    Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker
    Defender rootkit, and more. The book provides a simple and clean explanation of how to effectively utilize the tools and
    introduces a four-step methodology for conducting a penetration test or hack. You will be provided with the know-how
    required to jump start your career or gain a better understanding of offensive security. The book walks through each of
    the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be
    fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the
    tools and phases function and relate.
    * The second edition includes updated information covering Kali Linux as well as focusing on the seminal tools required
    to complete a penetration test
    * New tools added including the Social Engineer Toolkit, Meterpreter, w3af and more!
    * Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and
    utilize those results in later phases
    * Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration
    Testing, and Ethical Hacking, and Exploitation classes at Dakota State University


    Bestsellers in Management Information Systems