19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In this part . . .<br />

N ow that you’re off and running with your ethical<br />

hacking tests, it’s time to take things to a new level.<br />

The tests in the previous part — at least the social engineering<br />

and physical security tests — start at a high level<br />

and are not that technical. Times, they are a-changin’! You<br />

now need to look at network security. This is where things<br />

start getting more involved.<br />

This part starts by looking at the network from the inside<br />

and the outside for perimeter security holes, network<br />

device exploits, DoS vulnerabilities, and more. This part<br />

then looks at how to assess the security of wireless LANs<br />

that introduce some serious security vulnerabilities into<br />

networks these days. Finally, this part delves into the<br />

ever-growing number of mobile devices that employees<br />

use to connect to the network as they please.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!