Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

4 évaluations

4

Durée
6h 22min
Langue
Anglais
Format
Catégorie

Documents et essais

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (Livre audio): 9781663714060

Date de publication

Livre audio : 30 mars 2021

Mots-clés

    D'autres ont également apprécié ...

    1. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    2. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    3. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    4. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    5. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    6. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    7. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    8. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
      The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
    9. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    10. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    11. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    12. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
      Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    14. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
      Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
    15. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
      Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    16. Causal Inference
      Causal Inference Paul R. Rosenbaum
    17. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
      Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
    18. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    19. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    20. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    21. The World After Capital
      The World After Capital Albert Wenger
    22. HACKING: 3 BOOKS IN 1
      HACKING: 3 BOOKS IN 1 Alex Wagner
    23. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    24. Enterprise Artificial Intelligence Transformation
      Enterprise Artificial Intelligence Transformation Rashed Haq
    25. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    26. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    27. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    28. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
      Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
    29. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    30. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    31. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    32. Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition
      Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition Steven E. Koonin
    33. From Breakthrough to Blockbuster: The Business of Biotechnology
      From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
    34. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
      Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
    35. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
      Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
    36. Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council
      Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council Tina Corner-Stolz
    37. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    38. A History of Video Games in 64 Objects
      A History of Video Games in 64 Objects World Video Game Hall of Fame
    39. Disrupting the Game: From the Bronx to the Top of Nintendo
      Disrupting the Game: From the Bronx to the Top of Nintendo Reggie Fils-Aimé
    40. How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners
      How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners HowExpert
    41. The Great U.S.-China Tech War
      The Great U.S.-China Tech War Gordon G. Chang
    42. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
      You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
    43. Haunted Empire: Apple After Steve Jobs
      Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
    44. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    45. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
      Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
    46. Risks and Returns: Creating Success in Business and Life
      Risks and Returns: Creating Success in Business and Life Wilbur Ross
    47. Obfuscation: A User's Guide for Privacy and Protest
      Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
    48. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
      The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
    49. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    50. Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation
      Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation Andrew W. Lo
    51. Why The New Deal Matters
      Why The New Deal Matters Eric Rauchway
    52. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    53. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    54. Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement
      Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement Douglas B. Laney
    55. Project Myopia: Why Projects Damage Software #NoProjects
      Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly
    56. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    57. Up the Organization: How to Stop the Corporation from Stifling People and Strangling Profits
      Up the Organization: How to Stop the Corporation from Stifling People and Strangling Profits Warren Bennis
    58. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    59. Cowards: What Politicians, Radicals, and the Media Refuse to Say
      Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
    60. Thomas Edison: American Inventor
      Thomas Edison: American Inventor Michael W. Simmons
    61. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
      Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
    62. Hackers & Painters: Big Ideas from the Computer Age
      Hackers & Painters: Big Ideas from the Computer Age Paul Graham
    63. Think Better: Unlocking the Power of Reason
      Think Better: Unlocking the Power of Reason Ulrich L. Lehner
    64. Augmented: Life in The Smart Lane
      Augmented: Life in The Smart Lane Brett King
    65. SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy
      SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy Brady Dale
    66. Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques
      Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques Clint Sharp
    67. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
      Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
    68. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99€ /mois
    30 jours gratuits
    • 1 compte

    • 15 heures/mois

    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99€ /mois
    30 jours gratuits
    • 1 compte

    • 30 heures/mois

    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99€ /mois
    30 jours gratuits
    • 1 compte

    • 45 heures/mois

    Essayer maintenant