Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast Audiolibro Por Attila Kovacs arte de portada

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

Vista previa
Prueba por $0.00
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

De: Attila Kovacs
Narrado por: J. Matyas
Prueba por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $11.29

Compra ahora por $11.29

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you!

Frequently Asked Questions:

Q: I am new to IT, and I don’t have any experience in the field of hacking. Should I get this book?

A: This book is designed for those interested in penetration testing, aka ethical hacking, and having limited or no experience in the realm of cybersecurity.

Q: I am not a hacker. Are there any technical prerequisites for listening to this book?

A: No. This book is in everyday English, and no technical experience is required.

Q: I have been reading similar books before, but I am still not sure if I should buy this audiobook. How do I know whether this book is any good?

A: This book has been designed for you by a security architect having over a decade of experience on platforms such as Cisco Systems, Check Point, Palo Alto, Brocade, BackTrack, Kali Linux, Red Hat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more.... Learning from someone with real-life experience is extremely valuable. You will learn about real-life technologies and methodologies used in today’s IT Infrastructure and cybersecurity division.

Buy this book now, and get started today! In this book you will learn:

  • What Are the Foundations of Penetration Testing
  • What Are the Benefits of Penetration Testing
  • What Are the Frameworks of Penetration Testing
  • What Scanning Tools You Should Be Aware
  • What Credential Testing Tools You Must Utilize
  • What Debugging and Software Assurance Tools Are Available
  • Introduction to OSINT and Wireless Tools
  • What Is a Web Proxy, SET, and RDP
  • What Mobile Tools You Should Be Familiar With
  • How Communication Must Take Place
  • How to Cover Your Back
  • How to Set Up a Lab in NPE
  • How to Set Up Hyper-V on Windows 10
  • How to Set Up VMware on Windows 10
  • How to Assemble the Required Resources
  • How to Install Windows Server in VMware
  • How to Configure Windows Server in VMware
  • How to Install Windows Server in Hyper-V
  • How to Configure Windows Server in Hyper-V
  • How to Install and Configure OWASP-BWA in VMware
  • How to Install and Configure Metasploitable in VMware
  • How to Install Kali Linux in VMware
  • How to Install BlackArch in Hyper-V
  • What Categories of Penetration Tests Exists
  • What Software and Hardware You Must Have as a Pen Tester
  • Understanding Confidentiality
  • What Are the Rules of Engagement
  • How to Set Objectives and Deliverables
  • What Type of Targets You Must Deal with
  • Specialized Systems for Pen Testers
  • How to Identify and Respond to Risk
  • How to Prepare Your Pen Test Team for an Engagement
  • What Are the Best Practices Before Going Live

Buy this audiobook now, and get started today!

©2019 Attila Kovacs (P)2019 Attila Kovacs
Ciencia de Datos Seguridad y Cifrado Tecnología
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todas las estrellas
Más relevante  
A great book, just what you'd expect from this. Clear, straight forward, with examples and arguments. Perfect guide.

the best so far!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

I am glad to have chosen this book as my first pick. The narrator was very direct and the content was amazing. The speech to the book is also perfect.

really great

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Every chapter contains examples and definitions that are easy to follow and understand. The student will learn the basics of hacking

Amazing

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

This was an awesomely published audiobook. I thought this was just a fun book before I purchased it but after listening to it, it surpassed my expectations. It's been way better than I expected. Worthy of recommendation!

buy it!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

The book is a basic overview but is very general and explains more of the ‘why’ you need to pay attention to cyber security than to ‘what’ to do. Reader makes it difficult to stick with the book.

Reader almost unlistenable as he sounds like bored robot.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.