Hlustaðu og lestu

Stígðu inn í heim af óteljandi sögum

  • Lestu og hlustaðu eins mikið og þú vilt
  • Þúsundir titla
  • Getur sagt upp hvenær sem er
  • Engin skuldbinding
Prófa frítt
is Device Banner Block 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

4 einkunn

4

Lengd
6 Klst. 22 mín.
Tungumál
enska
Snið
Bókaflokkur

Óskáldað efni

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (Hljóðbók): 9781663714060

Útgáfudagur

Hljóðbók: 30 mars 2021

Aðrir höfðu einnig áhuga á...

  1. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  2. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  3. Hackable: How to Do Application Security Right
    Hackable: How to Do Application Security Right Ted Harrington
  4. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  5. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  6. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  7. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  8. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
    The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
  9. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  10. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  11. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  12. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
    Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  14. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  15. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  16. Causal Inference
    Causal Inference Paul R. Rosenbaum
  17. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
    Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
  18. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  19. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  20. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
    A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
  21. The World After Capital
    The World After Capital Albert Wenger
  22. HACKING: 3 BOOKS IN 1
    HACKING: 3 BOOKS IN 1 Alex Wagner
  23. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  24. Enterprise Artificial Intelligence Transformation
    Enterprise Artificial Intelligence Transformation Rashed Haq
  25. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
    Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  26. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  27. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  28. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
    Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
  29. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  30. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  31. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  32. Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition
    Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition Steven E. Koonin
  33. From Breakthrough to Blockbuster: The Business of Biotechnology
    From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
  34. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
    Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
  35. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
    Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
  36. Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council
    Your Seat at the Table: How to Create and Run Your Own Peer Advisory Council Tina Corner-Stolz
  37. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  38. A History of Video Games in 64 Objects
    A History of Video Games in 64 Objects World Video Game Hall of Fame
  39. Disrupting the Game: From the Bronx to the Top of Nintendo
    Disrupting the Game: From the Bronx to the Top of Nintendo Reggie Fils-Aimé
  40. How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners
    How To Jiu Jitsu For Beginners: Your Step By Step Guide To Jiu Jitsu For Beginners HowExpert
  41. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  42. The Great U.S.-China Tech War
    The Great U.S.-China Tech War Gordon G. Chang
  43. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
    You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
  44. Haunted Empire: Apple After Steve Jobs
    Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
  45. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  46. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  47. Risks and Returns: Creating Success in Business and Life
    Risks and Returns: Creating Success in Business and Life Wilbur Ross
  48. Obfuscation: A User's Guide for Privacy and Protest
    Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  49. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
    The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
  50. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  51. Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation
    Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation Andrew W. Lo
  52. Why The New Deal Matters
    Why The New Deal Matters Eric Rauchway
  53. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  54. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  55. Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement
    Building Analytics Teams: Harnessing analytics and artificial intelligence for business improvement Douglas B. Laney
  56. Project Myopia: Why Projects Damage Software #NoProjects
    Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly
  57. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  58. Up the Organization: How to Stop the Corporation from Stifling People and Strangling Profits
    Up the Organization: How to Stop the Corporation from Stifling People and Strangling Profits Warren Bennis
  59. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  60. Cowards: What Politicians, Radicals, and the Media Refuse to Say
    Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
  61. Thomas Edison: American Inventor
    Thomas Edison: American Inventor Michael W. Simmons
  62. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  63. Hackers & Painters: Big Ideas from the Computer Age
    Hackers & Painters: Big Ideas from the Computer Age Paul Graham
  64. Think Better: Unlocking the Power of Reason
    Think Better: Unlocking the Power of Reason Ulrich L. Lehner
  65. Augmented: Life in The Smart Lane
    Augmented: Life in The Smart Lane Brett King
  66. SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy
    SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy Brady Dale
  67. Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques
    Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques Clint Sharp
  68. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
    Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
  69. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith

Veldu áskrift

  • Yfir 900.000 hljóð- og rafbækur

  • Yfir 400 titlar frá Storytel Original

  • Barnvænt viðmót með Kids Mode

  • Vistaðu bækurnar fyrir ferðalögin

Vinsælast

Unlimited

Besti valkosturinn fyrir einn notanda

3290 kr /mánuði
3 dagar frítt
  • 1 aðgangur

  • Ótakmörkuð hlustun

  • Yfir 900.000 hljóð- og rafbækur

  • Engin skuldbinding

  • Getur sagt upp hvenær sem er

Prófaðu frítt

Family

Fyrir þau sem vilja deila sögum með fjölskyldu og vinum.

Frá 3990 kr/mánuði
3 dagar frítt
  • 2-6 aðgangar

  • 100 klst/mán fyrir hvern aðgang

  • Yfir 900.000 hljóð- og rafbækur

  • ‎Engin skuldbinding

  • Getur sagt upp hvenær sem er

2 aðgangar

3990 kr /á mánuði
Prófaðu frítt