The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this program is designed to expose the reader to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Armed with the knowledge from the Security Analyst series, along with proper experience, readers will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organizationas infrastructure. Penetration Testing: Network and Perimeter Testing. Network and Perimeter Testing coverage includes firewall and ids penetration testing as well as penetration testing of laptops, PDAas, cellphones, e-mail, and security patches. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.6-1 Step 4: Attempt Pairing Code Attacks . . . . Objectives . ... 6-2 Step 2: Unlock the iPhone . ... 6-5 Step 5: Check for Access Points with the Same Name and Encryption Type . ... 6-6 BlackBerry Penetration Testing .
|Title||:||Penetration Testing: Communication Media Testing|
|Publisher||:||Cengage Learning - 2010-06-23|