This book will discuss hacking methods and penetration testing techniques that are non-destructive in nature. This book is not intended for black hat (malicious) hackers. It will explore the malicious hacker's mindset, help the reader develop an ethical hacking plan, and cover 11 typical hack attacks and how to counteract them.
Finally, it will take the reader through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end users not to be victims of social engineering.