Listen and read

Step into an infinite world of stories

  • Listen and read as much as you want
  • Over 400 000+ titles
  • Bestsellers in 10+ Indian languages
  • Exclusive titles + Storytel Originals
  • Easy to cancel anytime
Details page - Device banner - 894x1036
Cover for Becoming an Ethical Hacker

Becoming an Ethical Hacker

17 Ratings

4

Series

1 of 19

Duration
3H 47min
Language
English
Format
Category

Personal Development

An acclaimed investigative journalist explores ethical hacking and presents a reader-friendly, informative guide to everything there is to know about entering the field of cybersecurity.

It’s impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it’s going, while providing vivid case studies illustrating how to become one of these “white hats” who specializes in ensuring the security of an organization’s information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity.

© 2019 Simon & Schuster Audio (Audiobook): 9781508294481

Release date

Audiobook: 7 May 2019

Others also enjoyed ...

  1. Arguing with Idiots: How to Stop Small Minds and Big Government
    Arguing with Idiots: How to Stop Small Minds and Big Government Glenn Beck
  2. Applied Minds: How Engineers Think
    Applied Minds: How Engineers Think Guru Madhavan
  3. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  4. The Pentester BluePrint: Starting a Career as an Ethical Hacker
    The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  5. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  6. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  7. The Professor in the Cage: Why Men Fight and Why We Like to Watch
    The Professor in the Cage: Why Men Fight and Why We Like to Watch Jonathan Gottschall
  8. Taming the Sun: Innovations to Harness Solar Energy and Power the Planet
    Taming the Sun: Innovations to Harness Solar Energy and Power the Planet Varun Sivaram
  9. Not Always Safe: A Cyber Crime Podcast
    Not Always Safe: A Cyber Crime Podcast Neelam Jain
  10. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  11. Ethical Hacking
    Ethical Hacking Introbooks Team
  12. The Lawyer Bubble: A Profession in Crisis
    The Lawyer Bubble: A Profession in Crisis Steven J. Harper
  13. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  14. Liars: How Progressives Exploit Our Fears for Power and Control
    Liars: How Progressives Exploit Our Fears for Power and Control Glenn Beck
  15. Teaching Johnny to Think: A Philosophy of Education Based on the Principles of Ayn Rand’s Objectivism
    Teaching Johnny to Think: A Philosophy of Education Based on the Principles of Ayn Rand’s Objectivism Leonard Peikoff
  16. Demographics and the Demand for Higher Education
    Demographics and the Demand for Higher Education Nathan D. Grawe
  17. Everything All at Once: How to Unleash Your Inner Nerd, Tap into Radical Curiosity and Solve Any Problem
    Everything All at Once: How to Unleash Your Inner Nerd, Tap into Radical Curiosity and Solve Any Problem Bill Nye
  18. Inconvenient Facts: The Science That Al Gore Doesn’t Want You to Know
    Inconvenient Facts: The Science That Al Gore Doesn’t Want You to Know Gregory Wrightstone
  19. You're Lying: Secrets From an Expert Military Interrogator to Spot the Lies and Get to the Truth
    You're Lying: Secrets From an Expert Military Interrogator to Spot the Lies and Get to the Truth Lena Sisco
  20. Intangibles: Unlocking the Science and Soul of Team Chemistry
    Intangibles: Unlocking the Science and Soul of Team Chemistry Joan Ryan
  21. Political Animals: How Our Stone-Age Brain Gets in the Way of Smart Politics
    Political Animals: How Our Stone-Age Brain Gets in the Way of Smart Politics Rick Shenkman
  22. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  23. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  24. The Code Economy: A Forty-Thousand Year History
    The Code Economy: A Forty-Thousand Year History Philip E. Auerswald
  25. Politics at Work: How Companies Turn Their Workers into Lobbyists
    Politics at Work: How Companies Turn Their Workers into Lobbyists Alexander Hertel-Fernandez
  26. Greatest Hackers in the History
    Greatest Hackers in the History Introbooks Team
  27. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  28. Bluffer's Guide To The Quantum Universe: Instant Wit & Wisdom
    Bluffer's Guide To The Quantum Universe: Instant Wit & Wisdom Jack Klaff
  29. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
    Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  30. What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition)
    What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition) Alan B. Krueger
  31. Augmented: Life in The Smart Lane
    Augmented: Life in The Smart Lane Brett King
  32. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  33. Timeless Learning: How Imagination, Observation, and Zero-Based Thinking Change Schools
    Timeless Learning: How Imagination, Observation, and Zero-Based Thinking Change Schools Pam Moran
  34. Physics for Rock Stars: Making the Laws of the Universe Work for You
    Physics for Rock Stars: Making the Laws of the Universe Work for You Christine McKinley
  35. Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security
    Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security Michael Savage
  36. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
    Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  37. How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners
    How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners HowExpert
  38. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
    Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
  39. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
    Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  40. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  41. A New Era in Banking: The Landscape After the Battle
    A New Era in Banking: The Landscape After the Battle Mauro F. Guillen
  42. Success in Africa: CEO Insights from a Continent on the Rise
    Success in Africa: CEO Insights from a Continent on the Rise Jonathan Berman
  43. None of My Business: P.J. Explains Money, Banking, Debt, Equity, Assets, Liabilities, and Why He’s not Rich and Neither Are You
    None of My Business: P.J. Explains Money, Banking, Debt, Equity, Assets, Liabilities, and Why He’s not Rich and Neither Are You P. J. O'Rourke
  44. Experience on Demand: What Virtual Reality Is, How It Works, and What It Can Do
    Experience on Demand: What Virtual Reality Is, How It Works, and What It Can Do Jeremy Bailenson
  45. Point Made: How to Write Like the Nation's Top Advocates, Second Edition
    Point Made: How to Write Like the Nation's Top Advocates, Second Edition Ross Guberman
  46. Artificial Intelligence: From Medieval Robots to Neural Networks
    Artificial Intelligence: From Medieval Robots to Neural Networks Clifford A. Pickover
  47. Obfuscation: A User's Guide for Privacy and Protest
    Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  48. Great Minds of Medicine: with Health Magazine
    Great Minds of Medicine: with Health Magazine Unapix Entertainment
  49. iDisorder: Understanding Our Obsession with Technology and Overcoming Its Hold on Us
    iDisorder: Understanding Our Obsession with Technology and Overcoming Its Hold on Us
  50. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  51. Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
    Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy Floyd Brown
  52. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  53. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  54. Heart: An American Medical Odyssey
    Heart: An American Medical Odyssey Dick Cheney
  55. Reputation: What Is It and Why It Matters
    Reputation: What Is It and Why It Matters Gloria Origgi
  56. 3D Printing
    3D Printing John M. Jordan
  57. Silicon Gold Rush: The Next Generation of High-Tech Stars Rewrites the Rules of Business
    Silicon Gold Rush: The Next Generation of High-Tech Stars Rewrites the Rules of Business Karen Southwick
  58. Smart Baseball: The Story Behind the Old Stats that are Ruining the Game, the New Ones that are Running it, and the Right Way to Think About Baseball
    Smart Baseball: The Story Behind the Old Stats that are Ruining the Game, the New Ones that are Running it, and the Right Way to Think About Baseball Keith Law
  59. Whiskey Business: How Small-Batch Distillers Are Transforming American Spirits
    Whiskey Business: How Small-Batch Distillers Are Transforming American Spirits Tom Acitelli
  60. Cowards: What Politicians, Radicals, and the Media Refuse to Say
    Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
  61. Drinking Water: A History
    Drinking Water: A History James Salzman
  62. Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success
    Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success Mark Wayne McGinnis
  63. Travel: The Worst-Case Scenario Survival Handbook: How to Survive: Runaway Camels, UFO Abductions and more
    Travel: The Worst-Case Scenario Survival Handbook: How to Survive: Runaway Camels, UFO Abductions and more David Borgenicht
  64. Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity (2 Manuscripts)
    Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity (2 Manuscripts) ATTILA KOVACS
  65. Addicted to Outrage: How Thinking Like a Recovering Addict Can Heal the Country
    Addicted to Outrage: How Thinking Like a Recovering Addict Can Heal the Country Glenn Beck
  66. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  67. Quantum Computers
    Quantum Computers Introbooks Team
  68. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  69. No Campus For White Men - The Transformation of Higher Education Into Hateful Indoctrination
    No Campus For White Men - The Transformation of Higher Education Into Hateful Indoctrination Scott Greer