Audible会員プラン登録で、20万以上の対象タイトルが聴き放題。
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- ナレーター: J. Matyas
- 再生時間: 3 時間 4 分
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。
あらすじ・解説
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you!
Frequently Asked Questions:
Q: I am new to IT, and I don’t have any experience in the field of hacking. Should I get this book?
A: This book is designed for those interested in penetration testing, aka ethical hacking, and having limited or no experience in the realm of cybersecurity.
Q: I am not a hacker. Are there any technical prerequisites for listening to this book?
A: No. This book is in everyday English, and no technical experience is required.
Q: I have been reading similar books before, but I am still not sure if I should buy this audiobook. How do I know whether this book is any good?
A: This book has been designed for you by a security architect having over a decade of experience on platforms such as Cisco Systems, Check Point, Palo Alto, Brocade, BackTrack, Kali Linux, Red Hat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more.... Learning from someone with real-life experience is extremely valuable. You will learn about real-life technologies and methodologies used in today’s IT Infrastructure and cybersecurity division.
Buy this book now, and get started today! In this book you will learn:
- What Are the Foundations of Penetration Testing
- What Are the Benefits of Penetration Testing
- What Are the Frameworks of Penetration Testing
- What Scanning Tools You Should Be Aware
- What Credential Testing Tools You Must Utilize
- What Debugging and Software Assurance Tools Are Available
- Introduction to OSINT and Wireless Tools
- What Is a Web Proxy, SET, and RDP
- What Mobile Tools You Should Be Familiar With
- How Communication Must Take Place
- How to Cover Your Back
- How to Set Up a Lab in NPE
- How to Set Up Hyper-V on Windows 10
- How to Set Up VMware on Windows 10
- How to Assemble the Required Resources
- How to Install Windows Server in VMware
- How to Configure Windows Server in VMware
- How to Install Windows Server in Hyper-V
- How to Configure Windows Server in Hyper-V
- How to Install and Configure OWASP-BWA in VMware
- How to Install and Configure Metasploitable in VMware
- How to Install Kali Linux in VMware
- How to Install BlackArch in Hyper-V
- What Categories of Penetration Tests Exists
- What Software and Hardware You Must Have as a Pen Tester
- Understanding Confidentiality
- What Are the Rules of Engagement
- How to Set Objectives and Deliverables
- What Type of Targets You Must Deal with
- Specialized Systems for Pen Testers
- How to Identify and Respond to Risk
- How to Prepare Your Pen Test Team for an Engagement
- What Are the Best Practices Before Going Live
Buy this audiobook now, and get started today!