Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
it and profiting from the exercise. High profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms like
firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus
software. Hackers have proven their dedication and ability to systematically penetrate networks all over the
world. In some cases black hats may be able to execute attacks so flawlessly that they can compromise a system,
steal everything of value, and completely erase their tracks in less than 20 minutes!
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this series is designed to expose the reader to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Armed with the knowledge from the Security Analyst series, along with proper experience, readers will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization's infrastructure. The series prepares readers for the EC-Council Certified Security Analyst (E|CSA) certification. Penetration Testing: Network and Perimeter Testing. Network and Perimeter Testing coverage includes firewall and ids penetration testing as well as penetration testing of laptops, PDA's, cellphones, e-mail, and security patches.