The pentester blueprint : starting a career as an ethical hacker /
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN :
John Wiley,
[2021]
|
Subjects: | |
Online Access: | Connect to this title online (unlimited simultaneous users allowed; 325 uses per year) |
Table of Contents:
- Machine generated contents note: 1. What Is a Pentester?
- Synonymous Terms and Types of Hackers
- Pentests Described
- Benefits and Reasons
- Legality and Permission
- Pentest Methodology
- Pre-engagement Interactions
- Intelligence Gathering
- Threat Modeling
- Vulnerability Analysis
- Exploitation
- Post Exploitation
- Reporting
- Pentest Types
- Vulnerability Scanning
- Vulnerability Assessments
- Pentest Targets and Specializations
- Generalist Pentesting
- Application Pentesting
- Internet of Things (loT)
- Industrial Control Systems (ICS)
- Hardware and Medical Devices
- Social Engineering
- Physical Pentesting
- Transportation Pentesting
- Red Team Pentesting
- Career Outlook
- Summary
- 2. Prerequisite Skills
- Skills Required for Learning Pentesting
- Operating Systems
- Networking
- Information Security
- Prerequisites Learning
- Information Security Basics
- What Is Information Security?
- CIA Triad
- Security Controls
- Access Control
- Incident Response
- Malware
- Advanced Persistent Threats
- Cyber Kill Chain
- Common Vulnerabilities and Exposures
- Phishing and Other Social Engineering
- Airgapped Machines
- Dark Web
- Summary
- 3. Education of a Hacker
- Hacking Skills
- Hacker Mindset
- Pentester Blueprint Formula
- Ethical Hacking Areas
- Operating Systems and Applications
- Networks
- Social Engineering
- Physical Security
- Types of Pentesting
- Black Box Testing
- White Box Testing
- Cray Box Testing
- Brief History of Pentesting
- Early Days of Pentesting
- Improving the Security of Your Site by Breaking into It
- Pentesting Today
- Summary
- 4. Education Resources
- Pentesting Courses
- Pentesting Books
- Pentesting Labs
- Web Resources
- Summary
- 5. Building a Pentesting Lab
- Pentesting Lab Options
- Minimalist Lab
- Dedicated Lab
- Advanced Lab
- Hacking Systems
- Popular Pentesting Tools
- Kali Linux
- Nmap
- Wireshark
- Vulnerability Scanning Applications
- Hak5
- Hacking Targets
- PentestBox
- VulnHub
- Proving Grounds
- How Pentesters Build Their Labs
- Summary
- 6. Certifications and Degrees
- Pentesting Certifications
- Entry-Level Certifications
- Intermediate-Level Certifications
- Advanced-Level Certifications
- Specialization Web Application Pentesting Certifications
- Wireless Pentesting Certifications
- Mobile Pentesting Certifications
- Pentesting Training and Coursework
- Acquiring Pentesting Credentials
- Certification Study Resources
- CEH v10 Certified Ethical Hacker Study Guide
- EC-Council
- Quizlet CEH v10 Study Flashcards
- Hacking Wireless Networks for Dummies
- CompTIA PenTest+ Study Guide
- CompTIA PenTest+Website
- Cybrary's Advanced Penetration Testing
- Linux Server Security: Hack and Defend
- Advanced Penetration Testing: Hacking the World's Most Secure Networks
- Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Summary
- 7. Developing a Plan
- Skills Inventory
- Skill Gaps
- Action Plan
- Summary
- 8. Gaining Experience
- Capture the Flag
- Bug Bounties
- Brief History of Bug Bounty Programs
- Pro Bono and Volunteer Work
- Internships
- Labs
- Pentesters on Experience
- Summary
- 9. Getting Employed as a Pentester
- Job Descriptions
- Professional Networking
- Social Media
- Resume and Interview Tips
- Summary.