The Pentester BluePrint: Starting a Career as an Ethical Hacker

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER

The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:

  • The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems
  • The development of hacking skills and a hacker mindset
  • Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study
  • Which certifications and degrees are most useful for gaining employment as a pentester
  • How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Author(s): Phillip L. Wylie, Kim Crawley
Edition: 1
Publisher: Wiley
Year: 2020

Language: English
Pages: 192
Tags: Pentester; Pentesting Lab; Pentester Career Path; Pentester Career

Cover
Title Page
Copyright Page
About the Authors
Acknowledgments
Contents
Foreword
Introduction
Chapter 1 What Is a Pentester?
Synonymous Terms and Types of Hackers
Pentests Described
Benefits and Reasons
Legality and Permission
Pentest Methodology
Pre-engagement Interactions
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
Pentest Types
Vulnerability Scanning
Vulnerability Assessments
Pentest Targets and Specializations
Generalist Pentesting
Application Pentesting
Internet of Things (IoT)
Industrial Control Systems (ICS)
Hardware and Medical Devices
Social Engineering
Physical Pentesting
Transportation Pentesting
Red Team Pentesting
Career Outlook
Summary
Chapter 2 Prerequisite Skills
Skills Required for Learning Pentesting
Operating Systems
Networking
Information Security
Prerequisites Learning
Information Security Basics
What Is Information Security?
The CIA Triad
Security Controls
Access Control
Incident Response
Malware
Advanced Persistent Threats
The Cyber Kill Chain
Common Vulnerabilities and Exposures
Phishing and Other Social Engineering
Airgapped Machines
The Dark Web
Summary
Chapter 3 Education of a Hacker
Hacking Skills
Hacker Mindset
The Pentester Blueprint Formula
Ethical Hacking Areas
Operating Systems and Applications
Networks
Social Engineering
Physical Security
Types of Pentesting
Black Box Testing
White Box Testing
Gray Box Testing
A Brief History of Pentesting
The Early Days of Pentesting
Improving the Security of Your Site by Breaking into It
Pentesting Today
Summary
Chapter 4 Education Resources
Pentesting Courses
Pentesting Books
Pentesting Labs
Web Resources
Summary
Chapter 5 Building a Pentesting Lab
Pentesting Lab Options
Minimalist Lab
Dedicated Lab
Advanced Lab
Hacking Systems
Popular Pentesting Tools
Kali Linux
Nmap
Wireshark
Vulnerability Scanning Applications
Hak5
Hacking Targets
PentestBox
VulnHub
Proving Grounds
How Pentesters Build Their Labs
Summary
Chapter 6 Certifications and Degrees
Pentesting Certifications
Entry-Level Certifications
Intermediate-Level Certifications
Advanced-Level Certifications
Specialization Web Application Pentesting Certifications
Wireless Pentesting Certifications
Mobile Pentesting Certifications
Pentesting Training and Coursework
Acquiring Pentesting Credentials
Certification Study Resources
CEH v10 Certified Ethical Hacker Study Guide
EC-Council
Quizlet CEH v10 Study Flashcards
Hacking Wireless Networks for Dummies
CompTIA PenTest+ Study Guide
CompTIA PenTest+ Website
Cybrary’s Advanced Penetration Testing
Linux Server Security: Hack and Defend
Advanced Penetration Testing: Hacking the World’s Most Secure Networks
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Summary
Chapter 7 Developing a Plan
Skills Inventory
Skill Gaps
Action Plan
Summary
Chapter 8 Gaining Experience
Capture the Flag
Bug Bounties
A Brief History of Bug Bounty Programs
Pro Bono and Volunteer Work
Internships
Labs
Pentesters on Experience
Summary
Chapter 9 Getting Employed as a Pentester
Job Descriptions
Professional Networking
Social Media
Résumé and Interview Tips
Summary
Appendix: The Pentester Blueprint
Glossary
Index
EULA