Dengarkan dan baca

Masuki dunia cerita tanpa batas

  • Baca dan dengarkan sebanyak yang Anda mau
  • Lebih dari 1 juta judul
  • Judul eksklusif + Storytel Original
  • Uji coba gratis 14 hari, lalu €9,99/bulan
  • Mudah untuk membatalkan kapan saja
Coba gratis
Details page - Device banner - 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

4 Rating

4

Durasi
6 Jam 22 mnt
Bahasa
Inggris
Format
Kategori

Non Fiksi

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (Audiobook): 9781663714060

Tanggal rilis

Audiobook: 30 Maret 2021

Tag

    Yang lain juga menikmati...

    1. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    2. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    3. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    4. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    5. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    6. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    7. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    8. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
      The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
    9. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    10. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    11. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    12. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
      Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    14. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
      Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Joe Schwarcz
    15. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
      Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    16. Extraterrestrials
      Extraterrestrials Wade Roush
    17. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
      Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
    18. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    19. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    20. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    21. The World After Capital
      The World After Capital Albert Wenger
    22. HACKING: 3 BOOKS IN 1
      HACKING: 3 BOOKS IN 1 Alex Wagner
    23. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    24. Enterprise Artificial Intelligence Transformation
      Enterprise Artificial Intelligence Transformation Rashed Haq
    25. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    26. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    27. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    28. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
      Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
    29. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    30. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    31. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    32. Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition
      Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition Steven E. Koonin
    33. From Breakthrough to Blockbuster: The Business of Biotechnology
      From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
    34. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
      Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
    35. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
      Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
    36. Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council
      Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council Tina Corner-Stolz
    37. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    38. A History of Video Games in 64 Objects
      A History of Video Games in 64 Objects World Video Game Hall of Fame
    39. Disrupting the Game: From the Bronx to the Top of Nintendo
      Disrupting the Game: From the Bronx to the Top of Nintendo Reggie Fils-Aimé
    40. How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners
      How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners HowExpert
    41. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
      Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    42. The Great U.S.-China Tech War
      The Great U.S.-China Tech War Gordon G. Chang
    43. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
      You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
    44. Haunted Empire: Apple After Steve Jobs
      Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
    45. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    46. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
      Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
    47. Risks and Returns: Creating Success in Business and Life
      Risks and Returns: Creating Success in Business and Life Wilbur Ross
    48. Obfuscation: A User's Guide for Privacy and Protest
      Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
    49. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
      The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
    50. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    51. Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation
      Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation Andrew W. Lo
    52. Why The New Deal Matters
      Why The New Deal Matters Eric Rauchway
    53. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    54. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    55. Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement
      Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement Douglas B. Laney
    56. Project Myopia: Why Projects Damage Software #NoProjects
      Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly
    57. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    58. Life Entrepreneurs: Ordinary People Creating Extraordinary Lives
      Life Entrepreneurs: Ordinary People Creating Extraordinary Lives Christopher Gergen
    59. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    60. Cowards: What Politicians, Radicals, and the Media Refuse to Say
      Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
    61. Thomas Edison: American Inventor
      Thomas Edison: American Inventor Michael W. Simmons
    62. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
      Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
    63. Hackers & Painters: Big Ideas from the Computer Age
      Hackers & Painters: Big Ideas from the Computer Age Paul Graham
    64. Think Better: Unlocking the Power of Reason
      Think Better: Unlocking the Power of Reason Ulrich L. Lehner
    65. Augmented: Life in The Smart Lane
      Augmented: Life in The Smart Lane Brett King
    66. SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy
      SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy Brady Dale
    67. Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques
      Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques Clint Sharp
    68. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
      Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
    69. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith

    Selalu dengan Storytel

    • Lebih dari 900.000 judul

    • Mode Anak (lingkungan aman untuk anak)

    • Unduh buku untuk akses offline

    • Batalkan kapan saja

    Terpopuler

    Premium

    Bagi yang ingin mendengarkan dan membaca tanpa batas.

    Rp39000 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Premium 6 bulan

    Bagi yang ingin mendengarkan dan membaca tanpa batas

    Rp189000 /6 bulan
    7 hari gratis
    Hemat 19%
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Local

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp19900 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang

    Local 6 bulan

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp89000 /6 bulan
    7 hari gratis
    Hemat 25%
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang