Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of The pentester blueprint: starting a career as an ethical hacker
Bookmark Share

Text

The pentester blueprint: starting a career as an ethical hacker

Crawley, Kim - Personal Name; Wylie, Phillip L - Personal Name;

Table of contents

Cover
Title Page
Foreword

Introduction
How I Became a Pentester
Who Should Read This Book
What You Will Learn
How This Book Is Organized

1 What Is a Pentester?
Synonymous Terms and Types of Hackers
Pentests Described
Pentest Methodology
Pentest Types
Vulnerability Scanning
Vulnerability Assessments
Pentest Targets and Specializations
Career Outlook
Summary

2 Prerequisite Skills
Skills Required for Learning Pentesting
Information Security Basics
Summary

3 Education of a Hacker
Hacking Skills
Hacker Mindset
The Pentester Blueprint Formula
Ethical Hacking Areas
Types of Pentesting
A Brief History of Pentesting
Summary

4 Education Resources
Pentesting Courses
Pentesting Books
Pentesting Labs
Web Resources
Summary

5 Building a Pentesting Lab
Pentesting Lab Options
Hacking Systems
Popular Pentesting Tools
Hacking Targets
How Pentesters Build Their Labs
Summary

6 Certifications and Degrees
Pentesting Certifications
Pentesting Training and Coursework
Acquiring Pentesting Credentials
Certification Study Resources
Summary

7 Developing a Plan
Skills Inventory
Skill Gaps
Action Plan
Summary

8 Gaining Experience
Capture the Flag
Bug Bounties
A Brief History of Bug Bounty Programs
Pro Bono and Volunteer Work
Internships
Labs
Pentesters on Experience
Summary

9 Getting Employed as a Pentester
Job Descriptions
Professional Networking
Social Media
Résumé and Interview Tips
Summary

Appendix: The Pentester Blueprint
Glossary
Index
End User License Agreement


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.1092 WYL t
b0002606
Available
Detail Information
Series Title
--
Call Number
005.1092 WYL t
Publisher
New York : Wiley., 2021
Collation
xx, 172 hlm; ilus.; 23 cm
Language
English
ISBN/ISSN
9781119684305
Classification
005.1092
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Network Security
Ethical hacking (Computer security)
hacker
Specific Detail Info
--
Statement of Responsibility
Phillip L. Wylie dan Kim Crawley
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?