• Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

  • By: Attila Kovacs
  • Narrated by: J. Matyas
  • Length: 3 hrs and 4 mins
  • 4.8 out of 5 stars (18 ratings)

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast  By  cover art

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

By: Attila Kovacs
Narrated by: J. Matyas
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $11.29

Buy for $11.29

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you!

Frequently Asked Questions:

Q: I am new to IT, and I don’t have any experience in the field of hacking. Should I get this book?

A: This book is designed for those interested in penetration testing, aka ethical hacking, and having limited or no experience in the realm of cybersecurity.

Q: I am not a hacker. Are there any technical prerequisites for listening to this book?

A: No. This book is in everyday English, and no technical experience is required.

Q: I have been reading similar books before, but I am still not sure if I should buy this audiobook. How do I know whether this book is any good?

A: This book has been designed for you by a security architect having over a decade of experience on platforms such as Cisco Systems, Check Point, Palo Alto, Brocade, BackTrack, Kali Linux, Red Hat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more.... Learning from someone with real-life experience is extremely valuable. You will learn about real-life technologies and methodologies used in today’s IT Infrastructure and cybersecurity division.

Buy this book now, and get started today! In this book you will learn:

  • What Are the Foundations of Penetration Testing
  • What Are the Benefits of Penetration Testing
  • What Are the Frameworks of Penetration Testing
  • What Scanning Tools You Should Be Aware
  • What Credential Testing Tools You Must Utilize
  • What Debugging and Software Assurance Tools Are Available
  • Introduction to OSINT and Wireless Tools
  • What Is a Web Proxy, SET, and RDP
  • What Mobile Tools You Should Be Familiar With
  • How Communication Must Take Place
  • How to Cover Your Back
  • How to Set Up a Lab in NPE
  • How to Set Up Hyper-V on Windows 10
  • How to Set Up VMware on Windows 10
  • How to Assemble the Required Resources
  • How to Install Windows Server in VMware
  • How to Configure Windows Server in VMware
  • How to Install Windows Server in Hyper-V
  • How to Configure Windows Server in Hyper-V
  • How to Install and Configure OWASP-BWA in VMware
  • How to Install and Configure Metasploitable in VMware
  • How to Install Kali Linux in VMware
  • How to Install BlackArch in Hyper-V
  • What Categories of Penetration Tests Exists
  • What Software and Hardware You Must Have as a Pen Tester
  • Understanding Confidentiality
  • What Are the Rules of Engagement
  • How to Set Objectives and Deliverables
  • What Type of Targets You Must Deal with
  • Specialized Systems for Pen Testers
  • How to Identify and Respond to Risk
  • How to Prepare Your Pen Test Team for an Engagement
  • What Are the Best Practices Before Going Live

Buy this audiobook now, and get started today!

©2019 Attila Kovacs (P)2019 Attila Kovacs

What listeners say about Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

Average customer ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    15
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    13
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Story
  • 5 out of 5 stars
  • 5 Stars
    13
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

the best so far!

A great book, just what you'd expect from this. Clear, straight forward, with examples and arguments. Perfect guide.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

really great

I am glad to have chosen this book as my first pick. The narrator was very direct and the content was amazing. The speech to the book is also perfect.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Amazing

Every chapter contains examples and definitions that are easy to follow and understand. The student will learn the basics of hacking

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

buy it!

This was an awesomely published audiobook. I thought this was just a fun book before I purchased it but after listening to it, it surpassed my expectations. It's been way better than I expected. Worthy of recommendation!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars

Reader almost unlistenable as he sounds like bored robot.

The book is a basic overview but is very general and explains more of the ‘why’ you need to pay attention to cyber security than to ‘what’ to do. Reader makes it difficult to stick with the book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!