Atjaunināt sīkdatņu piekrišanu

E-grāmata: Pentester BluePrint: Starting a Career as an Ethical Hacker

4.17/5 (391 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Oct-2020
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119684350
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 23,49 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Oct-2020
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119684350
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:

  • The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems
  • The development of hacking skills and a hacker mindset
  • Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study
  • Which certifications and degrees are most useful for gaining employment as a pentester
  • How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Foreword xvi
Introduction xviii
1 What Is a Pentester?
1(16)
Synonymous Terms and Types of Hackers
2(1)
Pentests Described
3(2)
Benefits and Reasons
3(2)
Legality and Permission
5(1)
Pentest Methodology
5(4)
Pre-engagement Interactions
7(1)
Intelligence Gathering
7(1)
Threat Modeling
7(1)
Vulnerability Analysis
7(1)
Exploitation
8(1)
Post Exploitation
8(1)
Reporting
8(1)
Pentest Types
9(1)
Vulnerability Scanning
10(1)
Vulnerability Assessments
10(1)
Pentest Targets and Specializations
11(3)
Generalist Pentesting
11(1)
Application Pentesting
11(1)
Internet of Things (loT)
12(1)
Industrial Control Systems (ICS)
12(1)
Hardware and Medical Devices
13(1)
Social Engineering
13(1)
Physical Pentesting
13(1)
Transportation Pentesting
14(1)
Red Team Pentesting
14(1)
Career Outlook
14(2)
Summary
16(1)
2 Prerequisite Skills
17(26)
Skills Required for Learning Pentesting
18(2)
Operating Systems
18(1)
Networking
19(1)
Information Security
19(1)
Prerequisites Learning
19(1)
Information Security Basics
20(20)
What Is Information Security?
21(1)
The CIA Triad
22(2)
Security Controls
24(2)
Access Control
26(2)
Incident Response
28(2)
Malware
30(4)
Advanced Persistent Threats
34(1)
The Cyber Kill Chain
35(1)
Common Vulnerabilities and Exposures
36(1)
Phishing and Other Social Engineering
37(1)
Airgapped Machines
38(1)
The Dark Web
39(1)
Summary
40(3)
3 Education of a Hacker
43(12)
Hacking Skills
43(1)
Hacker Mindset
44(1)
The Pentester Blueprint Formula
45(1)
Ethical Hacking Areas
45(3)
Operating Systems and Applications
46(1)
Networks
46(1)
Social Engineering
47(1)
Physical Security
48(1)
Types of Pentesting
48(2)
Black Box Testing
49(1)
White Box Testing
49(1)
Cray Box Testing
50(1)
A Brief History of Pentesting
50(3)
The Early Days of Pentesting
51(1)
Improving the Security of Your Site by Breaking into It
51(1)
Pentesting Today
52(1)
Summary
53(2)
4 Education Resources
55(10)
Pentesting Courses
55(1)
Pentesting Books
56(4)
Pentesting Labs
60(1)
Web Resources
60(4)
Summary
64(1)
5 Building a Pentesting Lab
65(18)
Pentesting Lab Options
65(2)
Minimalist Lab
66(1)
Dedicated Lab
66(1)
Advanced Lab
67(1)
Hacking Systems
67(1)
Popular Pentesting Tools
68(2)
Kali Linux
68(1)
Nmap
69(1)
Wireshark
69(1)
Vulnerability Scanning Applications
69(1)
Hak5
70(1)
Hacking Targets
70(1)
PentestBox
70(1)
VulnHub
71(1)
Proving Grounds
71(1)
How Pentesters Build Their Labs
71(10)
Summary
81(2)
6 Certifications and Degrees
83(22)
Pentesting Certifications
83(8)
Entry-Level Certifications
84(1)
Intermediate-Level Certifications
85(2)
Advanced-Level Certifications
87(1)
Specialization Web Application Pentesting Certifications
88(2)
Wireless Pentesting Certifications
90(1)
Mobile Pentesting Certifications
91(1)
Pentesting Training and Coursework
91(1)
Acquiring Pentesting Credentials
92(7)
Certification Study Resources
99(3)
CEH v10 Certified Ethical Hacker Study Guide
100(1)
EC-Council
100(1)
Quizlet CEH v10 Study Flashcards
100(1)
Hacking Wireless Networks for Dummies
100(1)
CompTIA PenTest+ Study Guide
101(1)
CompTIA PenTest+Website
101(1)
Cybrary's Advanced Penetration Testing
101(1)
Linux Server Security: Hack and Defend
101(1)
Advanced Penetration Testing: Hacking the World's Most Secure Networks
102(1)
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
102(1)
Summary
102(3)
7 Developing a Plan
105(10)
Skills Inventory
105(6)
Skill Gaps
111(1)
Action Plan
112(1)
Summary
113(2)
8 Gaining Experience
115(22)
Capture the Flag
115(8)
Bug Bounties
123(1)
A Brief History of Bug Bounty Programs
124(1)
Pro Bono and Volunteer Work
125(1)
Internships
126(1)
Labs
126(1)
Pentesters on Experience
126(9)
Summary
135(2)
9 Getting Employed as a Pentester
137(12)
Job Descriptions
137(1)
Professional Networking
138(1)
Social Media
139(1)
Resume and Interview Tips
139(9)
Summary
148(1)
Appendix: The Pentester Blueprint 149(6)
Glossary 155(12)
Index 167
PHILLIP L. WYLIE has over two decades of experience working in IT and information security. In addition to working as a penetration tester he has founded and runs The Pwn School Project, teaching ethical hacking. He holds the CISSP, OSCP, and GWAPT certifications. He is a highly sought-after public speaker who frequently presents at conferences about pentesting. He was interviewed for the Tribe of Hackers Red Team book.

KIM CRAWLEY is dedicated to researching and writing about a plethora of cybersecurity issues. Some of the companies Kim has worked for over the years include Sophos, AT&T Cybersecurity, BlackBerry Cylance, Tripwire, and Venafi. All matters red team, blue team, and purple team fascinate her. But she's especially fascinated by malware, social engineering, and advanced persistent threats. Kim's extracurricular activities include running an online cybersecurity event called DisInfoSec, and autistic self-advocacy.