Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
Your form is submitting...
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
Email Address is required. 'Email Address' must contain at least 0 characters 'Email Address' cannot exceed 0 characters Please enter a valid Email Address
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Cengage, at your service! How can we best meet your needs? is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?

CompTIA PenTest+ Guide to Penetration Testing, 1st Edition

Rob S. Wilson

  • {{checkPublicationMessage('Published', '2023-03-21T00:00:00+0000')}}
Starting At $77.95 See pricing and ISBN options
CompTIA PenTest+ Guide to Penetration Testing 1st Edition by Rob S. Wilson

Overview

Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps students gain the knowledge and skills necessary to analyze systems in the same way hackers do, to identify vulnerabilities and to reduce security risks. All the information needed to successfully pass the CompTIA PenTest+ PTO-002 certification exam is included in this text. It contains detailed examples, projects, and hands-on activities where students can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing and the second module of the book walks students through the process of building their own penetration testing lab of virtual machines. The final module of the course brings everything together with a final project, which guides the reader in the creation of a penetration testing report that includes all the areas covered in earlier modules.

Rob S. Wilson

Robert S. Wilson is the cybersecurity curriculum coordinator and a cybersecurity instructor for Willis College (Canada’s oldest career college). Rob created Willis College’s Software Development and Cybersecurity Analyst (CSA) programs. Willis College’s CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (he worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity.
  • Module objectives -- Each module begins with a detailed list of the concepts to master. This list gives you a quick reference to the module’s contents and serves as a useful study aid.
  • Figures and tables -- Numerous screenshots show you how to use security tools, including command-line tools, and how to create programs. In addition, a variety of diagrams aid you in visualizing important concepts. Tables present information in an organized, easy-to-grasp manner.
  • Hands-on activities -- One of the best ways to reinforce learning about network security and security testing is to practice using the many tools security testers use. Hands-on activities are interspersed throughout each module to give you practice in applying what you have learned.
  • A Penetration Testing Lab -- Module 2 walks you through the process of building a lab of virtual machines, hosted on your own computer, that is used for practicing the use of pen testing tools and methodologies.
  • Notes -- Notes draw your attention to helpful material related to the subject being covered. In addition, notes with the title “Security Bytes” offer real-world examples related to security topics in each module.
  • Tips -- Tips offer extra information on resources and how to solve problems.
  • Caution -- Caution icons warn you about potential mistakes or problems and explain how to avoid them.
  • Module summary -- Each module ends with a summary of the concepts introduced in the module. These summaries are a helpful way to review the material covered in each module.
  • Key terms -- All terms in the module introduced with bold text are gathered together in the key terms list at the end of the module. This useful reference encourages a more thorough understanding of the module’s key concepts. A full definition of each key term is provided in the Glossary.
  • Review questions -- The end-of-module assessment begins with review questions that reinforce the main concepts and techniques covered in each module. Answering these questions helps ensure that you have mastered important topics.
  • Case projects -- Each module closes with one or more case projects that help you evaluate and apply the material you have learned. To complete these projects, you must draw on real-world common sense as well as your knowledge of the technical topics covered to that point in the course. Your goal for each project is to come up with answers to problems similar to those you’ll face as a working security tester. To help you with this goal, many case projects are based on a hypothetical company typical of those hiring security consultants.
  • Final Project -- The final module of the course brings everything together with a final project, which guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.
1. Introduction to Penetration Testing.
2. Setting Up a Penetration Testing Lab.
3. Planning and Scoping.
4. Information Gathering.
5. Performing Vulnerability Scanning.
6. Exploitation Methods and Tools.
7. Network Attacks and Attack Vectors.
8. Wireless and Specialized Systems Attack Vectors and Attacks.
9. Application-Based Attack Vectors and Attacks.
10. Host Attack Vectors and Cloud Technologies Attacks.
11. Social Engineering and Physical Attacks.
12. Reporting and Communication.
13. Writing and Understanding Code.
14. The Final Penetration Testing Project.
MindTap
Each MindTap product offers the full, mobile-ready textbook combined with superior and proven learning tools at one affordable price. Students who purchase digital access can add a print option at any time when a print option is available for their course.

This Cengage solution can be seamlessly integrated into most Learning Management Systems (Blackboard, Brightspace by D2L, Canvas, Moodle, and more) but does require a different ISBN for access codes. Please work with your Cengage Learning Consultant to ensure the proper course set up and ordering information. For additional information, please visit the LMS Integration site.

Standalone Digital Access — Ultimate Value

Recommended and most popular

  • ISBN-10: 0357445260
  • ISBN-13: 9780357445266
  • RETAIL $99.95

  • ISBN-10: 0357445295
  • ISBN-13: 9780357445297
  • RETAIL $99.95

  • ISBN-10: 8214027756
  • ISBN-13: 9798214027753
  • RETAIL $99.95

Textbook Only Options

Traditional eBook and Print Options

{{collapseContainerClosed['detail_0'] ? 'Show More' : 'Show Less'}}

  • ISBN-10: 0357709578
  • ISBN-13: 9780357709573
  • RETAIL $77.95

  • ISBN-10: 0357950658
  • ISBN-13: 9780357950654
  • RETAIL $245.95

  • ISBN-10: 0357952804
  • ISBN-13: 9780357952801
  • RETAIL $265.95

  • ISBN-10: 0357952812
  • ISBN-13: 9780357952818
  • RETAIL $265.95

Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.

FOR STUDENTS

MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 1 term Instant Access

ISBN: 9780357445266
MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 1st Edition, is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course -- to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You. MindTap gives you complete ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the eBook. All MindTap activities and assignments are tied to the learning objectives. The live virtual machine labs allow students to practice, explore and try different solutions in a safe, sandbox environment using real Cisco hardware and virtualized Windows, Linux and UNIX operating systems. Readings and projects give balanced coverage to prepare students to become future network security professionals. Security for Life assignments inspire students to stay current with new and emerging technologies. Pre- and post-exams offer scenario-based questions and allow you to measure how much students have learned using analytics and reporting that make it easy to see where the class stands in terms of progress, engagement and completion rates. Auto-graded module quizzes also help you gauge students' mastery of the course topics. Use the content and learning path as-is, or pick and choose how the material will wrap around your own content. You control what the students see and when they see it.

MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 2 terms Instant Access

ISBN: 9780357445297
MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 1st Edition, is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course -- to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You. MindTap gives you complete ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the eBook. All MindTap activities and assignments are tied to the learning objectives. The live virtual machine labs allow students to practice, explore and try different solutions in a safe, sandbox environment using real Cisco hardware and virtualized Windows, Linux and UNIX operating systems. Readings and projects give balanced coverage to prepare students to become future network security professionals. Security for Life assignments inspire students to stay current with new and emerging technologies. Pre- and post-exams offer scenario-based questions and allow you to measure how much students have learned using analytics and reporting that make it easy to see where the class stands in terms of progress, engagement and completion rates. Auto-graded module quizzes also help you gauge students' mastery of the course topics. Use the content and learning path as-is, or pick and choose how the material will wrap around your own content. You control what the students see and when they see it.

MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 2 terms Instant Access

ISBN: 9798214027753
MindTap for Wilson's CompTIA PenTest+ Guide to Penetration Testing, 1st Edition, is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course -- to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You. MindTap gives you complete ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the eBook. All MindTap activities and assignments are tied to the learning objectives. The live virtual machine labs allow students to practice, explore and try different solutions in a safe, sandbox environment using real Cisco hardware and virtualized Windows, Linux and UNIX operating systems. Readings and projects give balanced coverage to prepare students to become future network security professionals. Security for Life assignments inspire students to stay current with new and emerging technologies. Pre- and post-exams offer scenario-based questions and allow you to measure how much students have learned using analytics and reporting that make it easy to see where the class stands in terms of progress, engagement and completion rates. Auto-graded module quizzes also help you gauge students' mastery of the course topics. Use the content and learning path as-is, or pick and choose how the material will wrap around your own content. You control what the students see and when they see it.