Audible会員プラン登録で、20万以上の対象タイトルが聴き放題。

プレビューの再生
  • Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

  • 著者: Attila Kovacs
  • ナレーター: J. Matyas
  • 再生時間: 3 時間 4 分

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

無料体験で、20万以上の対象作品が聴き放題に
アプリならオフライン再生可能
プロの声優や俳優の朗読も楽しめる
Audibleでしか聴けない本やポッドキャストも多数
無料体験終了後は月額¥1,500。いつでも退会できます。

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast

著者: Attila Kovacs
ナレーター: J. Matyas
¥1,330で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥1,900 で購入

¥1,900 で購入

下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら

あらすじ・解説

Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you!

Frequently Asked Questions:

Q: I am new to IT, and I don’t have any experience in the field of hacking. Should I get this book?

A: This book is designed for those interested in penetration testing, aka ethical hacking, and having limited or no experience in the realm of cybersecurity.

Q: I am not a hacker. Are there any technical prerequisites for listening to this book?

A: No. This book is in everyday English, and no technical experience is required.

Q: I have been reading similar books before, but I am still not sure if I should buy this audiobook. How do I know whether this book is any good?

A: This book has been designed for you by a security architect having over a decade of experience on platforms such as Cisco Systems, Check Point, Palo Alto, Brocade, BackTrack, Kali Linux, Red Hat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more.... Learning from someone with real-life experience is extremely valuable. You will learn about real-life technologies and methodologies used in today’s IT Infrastructure and cybersecurity division.

Buy this book now, and get started today! In this book you will learn:

  • What Are the Foundations of Penetration Testing
  • What Are the Benefits of Penetration Testing
  • What Are the Frameworks of Penetration Testing
  • What Scanning Tools You Should Be Aware
  • What Credential Testing Tools You Must Utilize
  • What Debugging and Software Assurance Tools Are Available
  • Introduction to OSINT and Wireless Tools
  • What Is a Web Proxy, SET, and RDP
  • What Mobile Tools You Should Be Familiar With
  • How Communication Must Take Place
  • How to Cover Your Back
  • How to Set Up a Lab in NPE
  • How to Set Up Hyper-V on Windows 10
  • How to Set Up VMware on Windows 10
  • How to Assemble the Required Resources
  • How to Install Windows Server in VMware
  • How to Configure Windows Server in VMware
  • How to Install Windows Server in Hyper-V
  • How to Configure Windows Server in Hyper-V
  • How to Install and Configure OWASP-BWA in VMware
  • How to Install and Configure Metasploitable in VMware
  • How to Install Kali Linux in VMware
  • How to Install BlackArch in Hyper-V
  • What Categories of Penetration Tests Exists
  • What Software and Hardware You Must Have as a Pen Tester
  • Understanding Confidentiality
  • What Are the Rules of Engagement
  • How to Set Objectives and Deliverables
  • What Type of Targets You Must Deal with
  • Specialized Systems for Pen Testers
  • How to Identify and Respond to Risk
  • How to Prepare Your Pen Test Team for an Engagement
  • What Are the Best Practices Before Going Live

Buy this audiobook now, and get started today!

©2019 Attila Kovacs (P)2019 Attila Kovacs

Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fastに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。