
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $11.29
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
J. Matyas
-
De:
-
Attila Kovacs
Acerca de esta escucha
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you!
Frequently Asked Questions:
Q: I am new to IT, and I don’t have any experience in the field of hacking. Should I get this book?
A: This book is designed for those interested in penetration testing, aka ethical hacking, and having limited or no experience in the realm of cybersecurity.
Q: I am not a hacker. Are there any technical prerequisites for listening to this book?
A: No. This book is in everyday English, and no technical experience is required.
Q: I have been reading similar books before, but I am still not sure if I should buy this audiobook. How do I know whether this book is any good?
A: This book has been designed for you by a security architect having over a decade of experience on platforms such as Cisco Systems, Check Point, Palo Alto, Brocade, BackTrack, Kali Linux, Red Hat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more.... Learning from someone with real-life experience is extremely valuable. You will learn about real-life technologies and methodologies used in today’s IT Infrastructure and cybersecurity division.
Buy this book now, and get started today! In this book you will learn:
- What Are the Foundations of Penetration Testing
- What Are the Benefits of Penetration Testing
- What Are the Frameworks of Penetration Testing
- What Scanning Tools You Should Be Aware
- What Credential Testing Tools You Must Utilize
- What Debugging and Software Assurance Tools Are Available
- Introduction to OSINT and Wireless Tools
- What Is a Web Proxy, SET, and RDP
- What Mobile Tools You Should Be Familiar With
- How Communication Must Take Place
- How to Cover Your Back
- How to Set Up a Lab in NPE
- How to Set Up Hyper-V on Windows 10
- How to Set Up VMware on Windows 10
- How to Assemble the Required Resources
- How to Install Windows Server in VMware
- How to Configure Windows Server in VMware
- How to Install Windows Server in Hyper-V
- How to Configure Windows Server in Hyper-V
- How to Install and Configure OWASP-BWA in VMware
- How to Install and Configure Metasploitable in VMware
- How to Install Kali Linux in VMware
- How to Install BlackArch in Hyper-V
- What Categories of Penetration Tests Exists
- What Software and Hardware You Must Have as a Pen Tester
- Understanding Confidentiality
- What Are the Rules of Engagement
- How to Set Objectives and Deliverables
- What Type of Targets You Must Deal with
- Specialized Systems for Pen Testers
- How to Identify and Respond to Risk
- How to Prepare Your Pen Test Team for an Engagement
- What Are the Best Practices Before Going Live
Buy this audiobook now, and get started today!
©2019 Attila Kovacs (P)2019 Attila KovacsLos oyentes también disfrutaron...
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 12 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- De Byzantine Technologies LLC en 07-16-19
De: Lance Henderson
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De: Wm. Arthur Conklin, Greg White
- Narrado por: Derek Shoales
- Duración: 30 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- De Zak West en 12-03-23
De: Wm. Arthur Conklin, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Traffic Secrets
- The Underground Playbook for Filling Your Websites and Funnels with Your Dream Customers
- De: Russell Brunson
- Narrado por: Russell Brunson
- Duración: 6 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Master the evergreen traffic strategies to fill your website and funnels with your dream customers in this timeless work from the $100 million entrepreneur and cofounder of the software company ClickFunnels.
-
-
Slow Down Bro!!!
- De Terence Fisher en 10-18-20
De: Russell Brunson
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 12 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- De Byzantine Technologies LLC en 07-16-19
De: Lance Henderson
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De: Wm. Arthur Conklin, Greg White
- Narrado por: Derek Shoales
- Duración: 30 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- De Zak West en 12-03-23
De: Wm. Arthur Conklin, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Traffic Secrets
- The Underground Playbook for Filling Your Websites and Funnels with Your Dream Customers
- De: Russell Brunson
- Narrado por: Russell Brunson
- Duración: 6 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Master the evergreen traffic strategies to fill your website and funnels with your dream customers in this timeless work from the $100 million entrepreneur and cofounder of the software company ClickFunnels.
-
-
Slow Down Bro!!!
- De Terence Fisher en 10-18-20
De: Russell Brunson
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- De: Learn Computer Hacking in Deep
- Narrado por: Jowanna Lewis
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
-
KLCP TRAINING
- De Suwan Lechowicz en 03-16-20
-
The Book on Managing Rental Properties
- A Proven System for Finding, Screening, and Managing Tenants with Fewer Headaches and Maximum Profits
- De: Brandon Turner, Heather Turner
- Narrado por: Brandon Turner
- Duración: 8 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
No matter how great you are at finding real estate deals, you could lose everything if you don’t manage your properties correctly. However, being a landlord doesn’t have to mean middle-of-the-night phone calls, costly evictions, or daily frustrations with ungrateful tenants. Being a landlord can be fun - but only if you do it right!
-
-
Incredible Volume of Awesome Information
- De Ossie Moore en 07-29-16
De: Brandon Turner, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- De: Alan T. Norman
- Narrado por: Jack Ares
- Duración: 1 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
-
I had to jump back and forth.
- De HyPEAe en 05-16-20
De: Alan T. Norman
-
Building a Second Brain
- A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential
- De: Tiago Forte
- Narrado por: André Santana, Tiago Forte
- Duración: 7 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
For the first time in history, we have instantaneous access to the world’s knowledge. There has never been a better time to learn, to contribute, and to improve ourselves. Yet, rather than feeling empowered, we are often left feeling overwhelmed by this constant influx of information. The very knowledge that was supposed to set us free has instead led to the paralyzing stress of believing we’ll never know or remember enough. Now, this eye-opening and accessible guide shows how you can easily create your own personal system for knowledge management, otherwise known as a Second Brain.
-
-
Huge over promise
- De MARCELO F. en 03-15-23
De: Tiago Forte
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Computer Science Beginners Crash Course
- Coding Data, Python, Algorithms & Hacking (Road to Financial Freedom)
- De: Ian Batantu
- Narrado por: David Bray
- Duración: 1 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
The world of computers is growing at an unrecordable rate every day. Computers are the most influential tools in our lives. They are our present and future. Most users see a computer at the front and use the graphical user interfaces. The first time I used a computer, it intrigued me to know how these interfaces work. In this book, you will learn the same way I did.
-
-
Garbage
- De Anonymous User en 01-12-22
De: Ian Batantu
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
CEH Audio Crash Course
- Complete Review for the Certified Ethical Hacker Exam - Top Test Questions!
- De: Team Content Developers
- Narrado por: Lon Harris
- Duración: 10 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
Developed by experienced professors and professionally narrated for easy listening, this course is a valuable tool when preparing for your Certified Ethical Hacker or CEH test. The audiobook is focused and high-yield, covering the most important topics you need to know to succeed on the CEH exam. The material is accurate, up-to-date, and broken down into bite-sized chapters.
-
-
Well Made But Has Some Issues
- De Harlow en 12-27-21
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- De: Lester Evans
- Narrado por: Michael Reaves, Brian R. Scott
- Duración: 6 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
Misleading
- De D. Reeves en 08-14-19
De: Lester Evans
Lo que los oyentes dicen sobre Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Ian Rodgers
- 05-17-20
the best so far!
A great book, just what you'd expect from this. Clear, straight forward, with examples and arguments. Perfect guide.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Boris
- 05-18-20
really great
I am glad to have chosen this book as my first pick. The narrator was very direct and the content was amazing. The speech to the book is also perfect.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Timmy Peterson
- 05-17-20
Amazing
Every chapter contains examples and definitions that are easy to follow and understand. The student will learn the basics of hacking
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Jesse Davis
- 05-17-20
buy it!
This was an awesomely published audiobook. I thought this was just a fun book before I purchased it but after listening to it, it surpassed my expectations. It's been way better than I expected. Worthy of recommendation!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- William Keller
- 04-25-21
Reader almost unlistenable as he sounds like bored robot.
The book is a basic overview but is very general and explains more of the ‘why’ you need to pay attention to cyber security than to ‘what’ to do. Reader makes it difficult to stick with the book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña