The pentester blueprint : starting a career as an ethical hacker /

Saved in:
Bibliographic Details
Main Author: Wylie, Phillip L. (Author)
Corporate Author: ProQuest (Firm)
Other Authors: Crawley, Kim
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : John Wiley, [2021]
Subjects:
Online Access:Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Table of Contents:
  • Machine generated contents note: 1. What Is a Pentester?
  • Synonymous Terms and Types of Hackers
  • Pentests Described
  • Benefits and Reasons
  • Legality and Permission
  • Pentest Methodology
  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting
  • Pentest Types
  • Vulnerability Scanning
  • Vulnerability Assessments
  • Pentest Targets and Specializations
  • Generalist Pentesting
  • Application Pentesting
  • Internet of Things (loT)
  • Industrial Control Systems (ICS)
  • Hardware and Medical Devices
  • Social Engineering
  • Physical Pentesting
  • Transportation Pentesting
  • Red Team Pentesting
  • Career Outlook
  • Summary
  • 2. Prerequisite Skills
  • Skills Required for Learning Pentesting
  • Operating Systems
  • Networking
  • Information Security
  • Prerequisites Learning
  • Information Security Basics
  • What Is Information Security?
  • CIA Triad
  • Security Controls
  • Access Control
  • Incident Response
  • Malware
  • Advanced Persistent Threats
  • Cyber Kill Chain
  • Common Vulnerabilities and Exposures
  • Phishing and Other Social Engineering
  • Airgapped Machines
  • Dark Web
  • Summary
  • 3. Education of a Hacker
  • Hacking Skills
  • Hacker Mindset
  • Pentester Blueprint Formula
  • Ethical Hacking Areas
  • Operating Systems and Applications
  • Networks
  • Social Engineering
  • Physical Security
  • Types of Pentesting
  • Black Box Testing
  • White Box Testing
  • Cray Box Testing
  • Brief History of Pentesting
  • Early Days of Pentesting
  • Improving the Security of Your Site by Breaking into It
  • Pentesting Today
  • Summary
  • 4. Education Resources
  • Pentesting Courses
  • Pentesting Books
  • Pentesting Labs
  • Web Resources
  • Summary
  • 5. Building a Pentesting Lab
  • Pentesting Lab Options
  • Minimalist Lab
  • Dedicated Lab
  • Advanced Lab
  • Hacking Systems
  • Popular Pentesting Tools
  • Kali Linux
  • Nmap
  • Wireshark
  • Vulnerability Scanning Applications
  • Hak5
  • Hacking Targets
  • PentestBox
  • VulnHub
  • Proving Grounds
  • How Pentesters Build Their Labs
  • Summary
  • 6. Certifications and Degrees
  • Pentesting Certifications
  • Entry-Level Certifications
  • Intermediate-Level Certifications
  • Advanced-Level Certifications
  • Specialization Web Application Pentesting Certifications
  • Wireless Pentesting Certifications
  • Mobile Pentesting Certifications
  • Pentesting Training and Coursework
  • Acquiring Pentesting Credentials
  • Certification Study Resources
  • CEH v10 Certified Ethical Hacker Study Guide
  • EC-Council
  • Quizlet CEH v10 Study Flashcards
  • Hacking Wireless Networks for Dummies
  • CompTIA PenTest+ Study Guide
  • CompTIA PenTest+Website
  • Cybrary's Advanced Penetration Testing
  • Linux Server Security: Hack and Defend
  • Advanced Penetration Testing: Hacking the World's Most Secure Networks
  • Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • Summary
  • 7. Developing a Plan
  • Skills Inventory
  • Skill Gaps
  • Action Plan
  • Summary
  • 8. Gaining Experience
  • Capture the Flag
  • Bug Bounties
  • Brief History of Bug Bounty Programs
  • Pro Bono and Volunteer Work
  • Internships
  • Labs
  • Pentesters on Experience
  • Summary
  • 9. Getting Employed as a Pentester
  • Job Descriptions
  • Professional Networking
  • Social Media
  • Resume and Interview Tips
  • Summary.