Text
The pentester blueprint: starting a career as an ethical hacker
Table of contents
Cover
Title Page
Foreword
Introduction
How I Became a Pentester
Who Should Read This Book
What You Will Learn
How This Book Is Organized
1 What Is a Pentester?
Synonymous Terms and Types of Hackers
Pentests Described
Pentest Methodology
Pentest Types
Vulnerability Scanning
Vulnerability Assessments
Pentest Targets and Specializations
Career Outlook
Summary
2 Prerequisite Skills
Skills Required for Learning Pentesting
Information Security Basics
Summary
3 Education of a Hacker
Hacking Skills
Hacker Mindset
The Pentester Blueprint Formula
Ethical Hacking Areas
Types of Pentesting
A Brief History of Pentesting
Summary
4 Education Resources
Pentesting Courses
Pentesting Books
Pentesting Labs
Web Resources
Summary
5 Building a Pentesting Lab
Pentesting Lab Options
Hacking Systems
Popular Pentesting Tools
Hacking Targets
How Pentesters Build Their Labs
Summary
6 Certifications and Degrees
Pentesting Certifications
Pentesting Training and Coursework
Acquiring Pentesting Credentials
Certification Study Resources
Summary
7 Developing a Plan
Skills Inventory
Skill Gaps
Action Plan
Summary
8 Gaining Experience
Capture the Flag
Bug Bounties
A Brief History of Bug Bounty Programs
Pro Bono and Volunteer Work
Internships
Labs
Pentesters on Experience
Summary
9 Getting Employed as a Pentester
Job Descriptions
Professional Networking
Social Media
Résumé and Interview Tips
Summary
Appendix: The Pentester Blueprint
Glossary
Index
End User License Agreement
No other version available