• Ethical Hacking

  • The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
  • By: Lester Evans
  • Narrated by: Brian R. Scott
  • Length: 3 hrs and 35 mins
  • 3.9 out of 5 stars (38 ratings)

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Ethical Hacking  By  cover art

Ethical Hacking

By: Lester Evans
Narrated by: Brian R. Scott
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Ever feel like you don’t even own the hardware and software you paid dearly for?

Ever get the impression that you have to ask for permission before installing or changing a program on your device?

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?

You’re not alone.

Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.

There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.

In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.

Here’s just a tiny fraction of the topics covered in this audiobook:

  • Fighting against companies
  • Ethical hacking defined
  • War on the internet
  • Engineer’s mind
  • The almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi and much, much more!

If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

©2019 Lester Evans (P)2019 Lester Evans

What listeners say about Ethical Hacking

Average customer ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    25
  • 4 Stars
    2
  • 3 Stars
    2
  • 2 Stars
    2
  • 1 Stars
    7
Performance
  • 4 out of 5 stars
  • 5 Stars
    25
  • 4 Stars
    2
  • 3 Stars
    2
  • 2 Stars
    2
  • 1 Stars
    6
Story
  • 4 out of 5 stars
  • 5 Stars
    25
  • 4 Stars
    1
  • 3 Stars
    2
  • 2 Stars
    3
  • 1 Stars
    6

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great for getting started on the yellow brick road

Excellent read and just enough materials to get pointed in the right direction, top book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    2 out of 5 stars

basic

Very basic and redundant. It was tough to finish only being 3 hours long. Will keep lookijg for the right one for me.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

True to its title

This book does as promised - it gives the basics of penetration testing. When you're done reading this book you'll have an understanding of the most popular tools, be able to perform a pen test, interpret the results of your pen test, and shore up any cracks in your network/site.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

useful and Worthy

Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about the testing tools or techniques, this book delivers what is promised on the cover and much more!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

A listing of tools

A good reference to look through - but it's not going to teach you anything like an actual recipe where you actually cook something and get an item you can eat. Should have been called Ethical Hacking.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Beginners book

I have intermediate/beginner knowledge and always wanted to expand out. This is pretty good in that area and terms used are easy for beginner to get. Ended up being my top pick out of the books I purchased on this topic. Highly recommend to add to a collection. It's not a huge book but a decent size and the print isn't too small.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Too Basic, still great work.

Yeah, I understand the title states it's the Beginner’s Guide but I believe it could cover more deeper the knowledge involved in the techniques. Knowing the underlying technologies is fundamental for understanding how to use the same techniques in different scenarios and hence having more sophisticated tests.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This book is really informative

This book is really informative and thorough for anyone that is looking to try and get into a cyber security field.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    2 out of 5 stars
  • Story
    3 out of 5 stars

not what I expected but was decent

this book is for someone that may want to get into this kind of stuff and it almost hints at teaching you such things. although they teach you some things it's basically there to tell you why you would want to do this , how you can use it, and why you would. so if you are looking for a reason. this might be a good book. and also not know much of anything at all.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

A great on ramp for hackers.

Great book for the newbies, but also a nice resource for everybody that wants to know a structured, repeatable process to get going on network pen testing. Pat is the man!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful