Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

5 Bedømmelse

4.2

Varighed
6T 22M
Sprog
Engelsk
Format
Kategori

Fakta

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

© 2021 Ascent Audio (Lydbog): 9781663714060

Udgivelsesdato

Lydbog: 30. marts 2021

Andre kan også lide...

  1. Hackable: How to Do Application Security Right
    Hackable: How to Do Application Security Right Ted Harrington
  2. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  3. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  4. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  5. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  6. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  7. The World After Capital
    The World After Capital Albert Wenger
  8. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  9. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
    Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  10. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  11. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  12. Spatial Computing
    Spatial Computing Pamela Vold
  13. HACKING: 3 BOOKS IN 1
    HACKING: 3 BOOKS IN 1 Alex Wagner
  14. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  15. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
    A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
  16. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
    Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  17. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  18. Enterprise Artificial Intelligence Transformation
    Enterprise Artificial Intelligence Transformation Rashed Haq
  19. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  20. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
    The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
  21. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  22. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  23. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  24. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  25. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  26. Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry
    Greedy Bastards: Corporate Communists, Banksters, and the Other Vampires Who Suck America Dry Dylan Ratigan
  27. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
    Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
  28. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  29. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  30. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  31. Risks and Returns: Creating Success in Business and Life
    Risks and Returns: Creating Success in Business and Life Wilbur Ross
  32. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  33. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  34. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
    The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
  35. NO STARTUP SUGARCOATING: No sugarcoating, no fluff—just real, hard-earned lessons from 20+ years in the startup trenches.
    NO STARTUP SUGARCOATING: No sugarcoating, no fluff—just real, hard-earned lessons from 20+ years in the startup trenches. Titus Romer
  36. The Number That Killed Us: A Story of Modern Banking, Flawed Mathematics, and a Big Financial Crisis
    The Number That Killed Us: A Story of Modern Banking, Flawed Mathematics, and a Big Financial Crisis Pablo Triana
  37. Internet of Things: What You Need to Know About IoT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future
    Internet of Things: What You Need to Know About IoT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future Neil Wilkins
  38. Obfuscation: A User's Guide for Privacy and Protest
    Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  39. Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All
    Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Matthew Leising
  40. AI and the Future of the Public Sector: The Creation of Public Sector 4.0
    AI and the Future of the Public Sector: The Creation of Public Sector 4.0 Tony Boobier
  41. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable
    The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
  42. The Great U.S.-China Tech War
    The Great U.S.-China Tech War Gordon G. Chang
  43. Cowards: What Politicians, Radicals, and the Media Refuse to Say
    Cowards: What Politicians, Radicals, and the Media Refuse to Say Glenn Beck
  44. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
    TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
  45. Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition
    Unsettled: What Climate Science Tells Us, What It Doesn't, and Why It Matters / Updated and Expanded Edition Steven E. Koonin
  46. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  47. Haunted Empire: Apple After Steve Jobs
    Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
  48. Thomas Edison: American Inventor
    Thomas Edison: American Inventor Michael W. Simmons
  49. The Knowledge Gene
    The Knowledge Gene Lynne Kelly
  50. Making a Metaverse That Matters: From Snow Crash & Second Life to A Virtual World Worth Fighting For
    Making a Metaverse That Matters: From Snow Crash & Second Life to A Virtual World Worth Fighting For Wagner James Au
  51. The Postmodern Pilgrim's Progress: An Allegorical Tale
    The Postmodern Pilgrim's Progress: An Allegorical Tale Joel Berry
  52. Why The New Deal Matters
    Why The New Deal Matters Eric Rauchway
  53. From Breakthrough to Blockbuster: The Business of Biotechnology
    From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
  54. Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques
    Sambo: An Essential Guide to a Martial Art Similar to Judo, Jiu-Jitsu, and Wrestling along with Its Throws, Grappling Styles, Holds, and Submission Techniques Clint Sharp
  55. Salt Wars: The Battle Over the Biggest Killer in the American Diet
    Salt Wars: The Battle Over the Biggest Killer in the American Diet Michael F. Jacobson
  56. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  57. Greatest Hackers in the History
    Greatest Hackers in the History Introbooks Team
  58. Trampled by Unicorns: Big Tech's Empathy Problem and How to Fix It
    Trampled by Unicorns: Big Tech's Empathy Problem and How to Fix It Maelle Gavet
  59. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  60. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  61. The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits
    The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits Russell Glass

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet