Cargando…

The pentester blueprint : starting a career as an ethical hacker /

The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wylie, Phillip L. (Autor)
Otros Autores: Crawley, Kim
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : John Wiley, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1202439391
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 201031s2021 inu o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d DG1  |d OCLCO  |d UKAHL  |d N$T  |d OCLCF  |d EBLCP  |d UKMGB  |d RECBK  |d OCLCO  |d TEFOD  |d SOE  |d OCLCQ  |d OCLCO  |d SFB  |d IEEEE  |d OCLCQ  |d OCLCO 
015 |a GBC0G8073  |2 bnb 
016 7 |a 019991559  |2 Uk 
019 |a 1204134922  |a 1206238337 
020 |a 9781119684367  |q (electronic bk. ;  |q oBook) 
020 |a 1119684366  |q (electronic bk. ;  |q oBook) 
020 |a 9781119684374  |q (electronic bk.) 
020 |a 1119684374  |q (electronic bk.) 
020 |a 9781119684350  |q (electronic bk.) 
020 |a 1119684358  |q (electronic bk.) 
020 |z 1119684307 
020 |z 9781119684305 
024 7 |a 10.1002/9781119684367  |2 doi 
029 1 |a AU@  |b 000068212989 
029 1 |a AU@  |b 000069791688 
029 1 |a UKMGB  |b 019991559 
035 |a (OCoLC)1202439391  |z (OCoLC)1204134922  |z (OCoLC)1206238337 
037 |a 9781119684374  |b Wiley 
037 |a 130712B6-CAAB-4F8E-B316-FAB52A3BEB6A  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9820884  |b IEEE 
050 4 |a TK5105.59 
082 0 4 |a 005.8/7  |2 23 
049 |a UAMI 
100 1 |a Wylie, Phillip L.,  |e author. 
245 1 4 |a The pentester blueprint :  |b starting a career as an ethical hacker /  |c Phillip L. Wylie, Kim Crawley. 
264 1 |a Indianapolis, IN :  |b John Wiley,  |c [2021] 
264 4 |c Ã2021 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a What Is a Pentester? -- Prerequisite Skills -- Education of a Hacker -- Education Resources -- Building a Pentesting Lab -- Certifications and Degrees -- Developing a Plan -- Gaining Experience -- Getting Employed as a Pentester -- The Pentester Blueprint. 
500 |a Includes index. 
520 |a The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: -The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems -The development of hacking skills and a hacker mindset -Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study -Which certifications and degrees are most useful for gaining employment as a pentester -How to get experience in the pentesting field, including labs, CTFs, and bug bounties 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security)  |x Vocational guidance. 
650 0 |a Hacking  |x Vocational guidance. 
650 6 |a Tests d'intrusion  |x Orientation professionnelle. 
650 6 |a Piratage informatique  |x Orientation professionnelle. 
650 7 |a COMPUTERS  |x Security  |x Network Security.  |2 bisacsh 
650 7 |a Hacking  |2 fast 
700 1 |a Crawley, Kim. 
776 0 8 |i Print version:  |z 1119684307  |z 9781119684305  |w (OCoLC)1146299761 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119684305/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37841487 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6380281 
938 |a EBSCOhost  |b EBSC  |n 2661331 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00840950 
938 |a YBP Library Services  |b YANK  |n 301703813 
994 |a 92  |b IZTAP