Features
Module objectives -- Each module begins with a detailed list of the concepts to master. This list gives you a quick reference to the module’s contents and serves as a useful study aid.
Figures and tables -- Numerous screenshots show you how to use security tools, including command-line tools, and how to create programs. In addition, a variety of diagrams aid you in visualizing important concepts. Tables present information in an organized, easy-to-grasp manner.
Hands-on activities -- One of the best ways to reinforce learning about network security and security testing is to practice using the many tools security testers use. Hands-on activities are interspersed throughout each module to give you practice in applying what you have learned.
A Penetration Testing Lab -- Module 2 walks you through the process of building a lab of virtual machines, hosted on your own computer, that is used for practicing the use of pen testing tools and methodologies.
Notes -- Notes draw your attention to helpful material related to the subject being covered. In addition, notes with the title “Security Bytes” offer real-world examples related to security topics in each module.
Tips -- Tips offer extra information on resources and how to solve problems.
Caution -- Caution icons warn you about potential mistakes or problems and explain how to avoid them.
Module summary -- Each module ends with a summary of the concepts introduced in the module. These summaries are a helpful way to review the material covered in each module.
Key terms -- All terms in the module introduced with bold text are gathered together in the key terms list at the end of the module. This useful reference encourages a more thorough understanding of the module’s key concepts. A full definition of each key term is provided in the Glossary.
Review questions -- The end-of-module assessment begins with review questions that reinforce the main concepts and techniques covered in each module. Answering these questions helps ensure that you have mastered important topics.
Case projects -- Each module closes with one or more case projects that help you evaluate and apply the material you have learned. To complete these projects, you must draw on real-world common sense as well as your knowledge of the technical topics covered to that point in the course. Your goal for each project is to come up with answers to problems similar to those you’ll face as a working security tester. To help you with this goal, many case projects are based on a hypothetical company typical of those hiring security consultants.
Final Project -- The final module of the course brings everything together with a final project, which guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.