Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information you need to successfully pass the CompTIA PenTest+ PTO-002 certification exam and contains detailed examples, projects, and hands-on activities (including virtual machine labs and interactive online features) where you can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing, and then walks you through the process of building your own penetration testing lab of virtual machines (hosted on your own computer, which is used to practice the use of pen testing tools and methods). A final project guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information you need to successfully pass the CompTIA PenTest+ PTO-002 certification exam and contains detailed examples, projects, and hands-on activities (including virtual machine labs and interactive online features) where you can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing, and then walks you through the process of building your own penetration testing lab of virtual machines (hosted on your own computer, which is used to practice the use of pen testing tools and methods). A final project guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.