The Pentester BluePrint
Home > Computing and Information Technology > Computer networking and communications > Network security > The Pentester BluePrint: Starting a Career as an Ethical Hacker
The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

|
     0     
5
4
3
2
1




Available


About the Book

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Table of Contents:
Foreword xvi Introduction xviii 1 What is a Pentester? 1 Synonymous Terms and Types of Hackers 2 Pentests Described 3 Benefits and Reasons 3 Legality and Permission 5 Pentest Methodology 5 Pre-engagement Interactions 7 Intelligence Gathering 7 Threat Modeling 7 Vulnerability Analysis 7 Exploitation 8 Post Exploitation 8 Reporting 8 Pentest Types 9 Vulnerability Scanning 10 Vulnerability Assessments 10 Pentest Targets and Specializations 11 Generalist Pentesting 11 Application Pentesting 11 Internet of Things (IoT) 12 Industrial Control Systems (ICS) 12 Hardware and Medical Devices 13 Social Engineering 13 Physical Pentesting 13 Transportation Pentesting 14 Red Team Pentesting 14 Career Outlook 14 Summary 16 2 Prerequisite Skills 17 Skills Required for Learning Pentesting 18 Operating Systems 18 Networking 19 Information Security 19 Prerequisites Learning 19 Information Security Basics 20 What is Information Security? 21 The CIA Triad 22 Security Controls 24 Access Control 26 Incident Response 28 Malware 30 Advanced Persistent Threats 34 The Cyber Kill Chain 35 Common Vulnerabilities and Exposures 36 Phishing and Other Social Engineering 37 Airgapped Machines 38 The Dark Web 39 Summary 40 3 Education of a Hacker 43 Hacking Skills 43 Hacker Mindset 44 The Pentester Blueprint Formula 45 Ethical Hacking Areas 45 Operating Systems and Applications 46 Networks 46 Social Engineering 47 Physical Security 48 Types of Pentesting 48 Black Box Testing 49 White Box Testing 49 Gray Box Testing 50 A Brief History of Pentesting 50 The Early Days of Pentesting 51 Improving the Security of Your Site by Breaking into It 51 Pentesting Today 52 Summary 53 4 Education Resources 55 Pentesting Courses 55 Pentesting Books 56 Pentesting Labs 60 Web Resources 60 Summary 64 5 Building a Pentesting Lab 65 Pentesting Lab Options 65 Minimalist Lab 66 Dedicated Lab 66 Advanced Lab 67 Hacking Systems 67 Popular Pentesting Tools 68 Kali Linux 68 Nmap 69 Wireshark 69 Vulnerability Scanning Applications 69 Hak5 70 Hacking Targets 70 PentestBox 70 VulnHub 71 Proving Grounds 71 How Pentesters Build Their Labs 71 Summary 81 6 Certifications and Degrees 83 Pentesting Certifications 83 Entry-Level Certifications 84 Intermediate-Level Certifications 85 Advanced-Level Certifications 87 Specialization Web Application Pentesting Certifications 88 Wireless Pentesting Certifications 90 Mobile Pentesting Certifications 91 Pentesting Training and Coursework 91 Acquiring Pentesting Credentials 92 Certification Study Resources 99 CEH v10 Certified Ethical Hacker Study Guide 100 EC-Council 100 Quizlet CEH v10 Study Flashcards 100 Hacking Wireless Networks for Dummies 100 CompTIA PenTest+ Study Guide 101 CompTIA PenTest+ Website 101 Cybrary’s Advanced Penetration Testing 101 Linux Server Security: Hack and Defend 101 Advanced Penetration Testing: Hacking the World’s Most Secure Networks 102 The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 102 Summary 102 7 Developing a Plan 105 Skills Inventory 105 Skill Gaps 111 Action Plan 112 Summary 113 8 Gaining Experience 115 Capture the Flag 115 Bug Bounties 123 A Brief History of Bug Bounty Programs 124 Pro Bono and Volunteer Work 125 Internships 126 Labs 126 Pentesters on Experience 126 Summary 135 9 Getting Employed as a Pentester 137 Job Descriptions 137 Professional Networking 138 Social Media 139 Résumé and Interview Tips 139 Summary 148 Appendix: The Pentester Blueprint 149 Glossary 155 Index 167


Best Sellers


Product Details
  • ISBN-13: 9781119684305
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 226 mm
  • No of Pages: 192
  • Returnable: N
  • Sub Title: Starting a Career as an Ethical Hacker
  • Width: 150 mm
  • ISBN-10: 1119684307
  • Publisher Date: 04 Jan 2021
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 13 mm
  • Weight: 346 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
The Pentester BluePrint: Starting a Career as an Ethical Hacker
John Wiley & Sons Inc -
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Pentester BluePrint: Starting a Career as an Ethical Hacker

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!