Page de couverture de The Pentester BluePrint

The Pentester BluePrint

Starting a Career as an Ethical Hacker

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayez l’abonnement standard gratuitement
Choisissez 1 livre audio par mois dans notre collection contenant plus de 900 000 titres.
Écoutez les livres audio que vous avez sélectionnés tant que vous êtes membre.
Profitez d’un accès illimité à des balados incontournables.
L'abonnement Standard se renouvelle automatiquement au tarif de 8,99 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

The Pentester BluePrint

Auteur(s): Phillip L. Wylie, Kim Crawley
Narrateur(s): Matthew Josdal
Essayez l’abonnement standard gratuitement

8,99 $/mois après 30 jours. Annulable en tout temps

Acheter pour 19,49 $

Acheter pour 19,49 $

À propos de cet audio

Jump-start your new and exciting career as a penetration tester.

The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

©2021 John Wiley & Sons, Inc. (P)2021 Gildan Media
Réussite personnelle Sécurité et chiffrement Carrière Technologie Sécurité informatique Piratage Cybersécurité Logiciel Développement de logiciels Information Security
Pas encore de commentaire