Skip to main content

Professional Penetration Testing

Creating and Learning in a Hacking Lab

  • 3rd book:metaData.edition - January 21, 2025
  • book:metaData.latestEdition
  • common:contributors.author Thomas Wilhelm
  • publicationLanguages:language

Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetr… seeMoreDescription

Early spring sale

Nurture your knowledge

Grow your expertise with up to 25% off trusted resources.

promoMetaData.description

Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.

Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security

promoMetaData.keyFeatures

  • Helps users find out how to turn hacking and pen testing skills into a professional career
  • Covers how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
  • Presents metrics and reporting methodologies that provide experience crucial to a professional penetration tester
  • Includes test lab code that is available on the web

promoMetaData.readership

Designed for Information security professionals, penetration testers, cyber response and remediation teams, software developers, e-discovery researchers, security managers, computer science analysts, consultants, and researchers in academia and industry

promoMetaData.tableOfContents

1. Introduction

2. Ethics and Hacking

3. Picking your Pentesting Focus

4. Setting up your Labs

5. The Cyber Kill Chain

6. Reconnaissance

7. Weaponization

8. Delivery

9. Exploitation

10. Installation

11. Command & Control

12. Actions on Objectives

13. Targeting the Network

14. Web Application Attack Techniques

15. Cloud Testing

16. Reporting Results

17. Hacking as a Career

promoMetaData.productDetails

  • productDetails.edition: 3
  • book:metaData.latestEdition
  • productDetails.published: January 21, 2025
  • publicationLanguages:languageTitle: publicationLanguages:en

promoMetaData.aboutTheAuthor

TW

Thomas Wilhelm

Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.

Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master’s degrees in both Computer Science and Management.

His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.

promoMetaData.affiliationsAndExpertise
Managing Director, Redstone Securities, Colorado Springs, CO, USA

common:scienceDirect.bookHeader