ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

5 คะแนน

4.2

ระยะเวลา
6 ชม. 22 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (หนังสือเสียง): 9781663714060

วันเปิดตัว

หนังสือเสียง: 30 มีนาคม 2564

แท็ก

    คนอื่นก็สนุก...

    1. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    2. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    3. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    4. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    5. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    6. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    7. The World After Capital
      The World After Capital Albert Wenger
    8. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    9. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
      Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    10. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    11. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    12. fMRI
      fMRI Peter A. Bandettini
    13. HACKING: 3 BOOKS IN 1
      HACKING: 3 BOOKS IN 1 Alex Wagner
    14. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    15. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    16. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    17. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
      Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    18. Enterprise Artificial Intelligence Transformation
      Enterprise Artificial Intelligence Transformation Rashed Haq
    19. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    20. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
      The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
    21. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    22. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    23. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    24. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    25. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    26. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
      Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
    27. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
      Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
    28. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    29. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
      Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
    30. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    31. Risks and Returns: Creating Success in Business and Life
      Risks and Returns: Creating Success in Business and Life Wilbur Ross
    32. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    33. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
      Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    34. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
      The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
    35. NO STARTUP SUGARCOATING: No sugarcoating, no fluff—just real, hard-earned lessons from 20+ years in the startup trenches.
      NO STARTUP SUGARCOATING: No sugarcoating, no fluff—just real, hard-earned lessons from 20+ years in the startup trenches. Titus Romer
    36. The Number That Killed Us: A Story of Modern Banking, Flawed Mathematics, and a Big Financial Crisis
      The Number That Killed Us: A Story of Modern Banking, Flawed Mathematics, and a Big Financial Crisis Pablo Triana
    37. Internet of Things: What You Need to Know About IoT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future
      Internet of Things: What You Need to Know About IoT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future Neil Wilkins
    38. Obfuscation: A User's Guide for Privacy and Protest
      Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
    39. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
      Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
    40. AI and the Future of the Public Sector: The Creation of Public Sector 4.0
      AI and the Future of the Public Sector: The Creation of Public Sector 4.0 Tony Boobier
    41. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable
      The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    42. The Great U.S.-China Tech War
      The Great U.S.-China Tech War Gordon G. Chang
    43. Cowards: What Politicians, Radicals, and the Media Refuse to Say
      Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
    44. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
      TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
    45. Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition
      Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition Steven E. Koonin
    46. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    47. Haunted Empire: Apple After Steve Jobs
      Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
    48. Thomas Edison: American Inventor
      Thomas Edison: American Inventor Michael W. Simmons
    49. The Knowledge Gene
      The Knowledge Gene Lynne Kelly
    50. Making a Metaverse That Matters: From Snow Crash & Second Life to A Virtual World Worth Fighting For
      Making a Metaverse That Matters: From Snow Crash & Second Life to A Virtual World Worth Fighting For Wagner James Au
    51. The Postmodern Pilgrim's Progress: An Allegorical Tale
      The Postmodern Pilgrim's Progress: An Allegorical Tale Joel Berry
    52. Why The New Deal Matters
      Why The New Deal Matters Eric Rauchway
    53. From Breakthrough to Blockbuster: The Business of Biotechnology
      From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
    54. Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques
      Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques Clint Sharp
    55. Salt Wars: The Battle Over the Biggest Killer in the American Diet
      Salt Wars: The Battle Over the Biggest Killer in the American Diet Michael F. Jacobson
    56. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    57. Greatest Hackers in the History
      Greatest Hackers in the History Introbooks Team
    58. Trampled by Unicorns: Big Tech's Empathy Problem and How to Fix It
      Trampled by Unicorns: Big Tech's Empathy Problem and How to Fix It Maelle Gavet
    59. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    60. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    61. The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits
      The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits Russell Glass

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน
    • 1 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน
    • 3 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม