ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

4 คะแนน

4

ระยะเวลา
6 ชม. 22 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (หนังสือเสียง): 9781663714060

วันเปิดตัว

หนังสือเสียง: 30 มีนาคม 2564

แท็ก

    คนอื่นก็สนุก...

    1. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
      Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    2. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    3. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    4. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    5. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
      Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    6. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    7. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    8. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    9. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    10. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    11. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    12. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    13. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    14. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    15. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    16. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
      You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
    17. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    18. Hackers & Painters: Big Ideas from the Computer Age
      Hackers & Painters: Big Ideas from the Computer Age Paul Graham
    19. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    20. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    21. Phishing for Phools: The Economics of Manipulation and Deception
      Phishing for Phools: The Economics of Manipulation and Deception George A. Akerlof
    22. Your Data, Their Billions: Unraveling and Simplifying Big Tech
      Your Data, Their Billions: Unraveling and Simplifying Big Tech Jane S. Hoffman
    23. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable
      The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    24. Obfuscation: A User's Guide for Privacy and Protest
      Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
    25. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    26. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    27. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    28. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
      The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
    29. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    30. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
      Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
    31. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    32. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    33. Contraception: A Concise History
      Contraception: A Concise History Donna J. Drucker
    34. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
      The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack
    35. Enterprise Artificial Intelligence Transformation
      Enterprise Artificial Intelligence Transformation Rashed Haq
    36. HACKING: 3 BOOKS IN 1
      HACKING: 3 BOOKS IN 1 Alex Wagner
    37. Overcomplicated: Technology at the Limits of Comprehension
      Overcomplicated: Technology at the Limits of Comprehension Samuel Arbesman
    38. The High Cost of Free Parking, Updated Edition
      The High Cost of Free Parking, Updated Edition Donald Shoup
    39. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    40. A History of Video Games in 64 Objects
      A History of Video Games in 64 Objects World Video Game Hall of Fame
    41. Ludicrous: The Unvarnished Story of Tesla Motors
      Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
    42. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
      Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
    43. Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage
      Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage Eamon Javers
    44. Life in the Financial Markets: How They Really Work And Why They Matter To You
      Life in the Financial Markets: How They Really Work And Why They Matter To You Daniel Lacalle
    45. The Failure of Risk Management: Why It's Broken and How to Fix It 2nd Edition
      The Failure of Risk Management: Why It's Broken and How to Fix It 2nd Edition Douglas W. Hubbard

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน
    • 1 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน
    • 3 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม