CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits, 1st Edition (Paperback) book cover

CISO's Guide to Penetration Testing

A Framework to Plan, Manage, and Maximize Benefits, 1st Edition

By James S. Tiller

Auerbach Publications

389 pages

Purchasing Options:$ = USD
Paperback: 9780367382001
pub: 2019-07-31
SAVE ~$14.99
Available for pre-order
$74.95
$59.96
x
Hardback: 9781439880272
pub: 2011-12-13
SAVE ~$17.39
$86.95
$69.56
x
eBook (VitalSource) : 9780429184758
pub: 2016-04-19
from $43.48


FREE Standard Shipping!

Description

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.





From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations.





The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment.





Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker’s perspective and presents a comprehensive framework to help you meet the objectives of penetration testing—including deliverables and the final report.



Table of Contents

Hacking and Security. Hacking Impacts. Black and White. Information Security. The Hacker. The Security Consultant. Business Justification. The Business of Security. Expectations. Timing is Everything. Reasoning. Consultative Approach. Ethics. Logistics. Methodology. Reconnaissance. Vulnerability Assessment. Testing. Tools and Technology. Exposures. Top 25 Tools. Scenarios. Conclusion.

About the Author

James S. Tiller is the Vice-President of Security Professional Services, North American BT Global Services.

Subject Categories

BISAC Subject Codes/Headings:
BUS041000
BUSINESS & ECONOMICS / Management
COM032000
COMPUTERS / Information Technology
COM053000
COMPUTERS / Security / General