Phillip L. Wylie - The Pentester BluePrint: Starting a Career as an Ethical Hacker
Here you can read online Phillip L. Wylie - The Pentester BluePrint: Starting a Career as an Ethical Hacker full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Wiley, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:The Pentester BluePrint: Starting a Career as an Ethical Hacker
- Author:
- Publisher:Wiley
- Genre:
- Year:2020
- Rating:4 / 5
- Favourites:Add to favourites
- Your mark:
- 80
- 1
- 2
- 3
- 4
- 5
The Pentester BluePrint: Starting a Career as an Ethical Hacker: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Pentester BluePrint: Starting a Career as an Ethical Hacker" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
The Pentester BluePrint: Starting a Career as an Ethical Hacker — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Pentester BluePrint: Starting a Career as an Ethical Hacker" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
- Chapter 7
- Chapter 3
Phillip L. Wylie
Kim Crawley
Copyright 2021 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-68430-5
ISBN: 978-1-119-68435-0 (ebk)
ISBN: 978-1-119-68437-4 (ebk)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions
.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or website may provide or recommendations it may make. Further, readers should be aware that Internet websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services please contact our Customer Care Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at booksupport.wiley.com
. For more information about Wiley products, visit www.wiley.com
.
Library of Congress Control Number: 2020943760
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
I dedicate The Pentester Blueprint to my wife Tiffany and daughter Jordan. Without your love and support, this would not have been possible. As always you support me in my endeavors, encouraging me every step of the way.
Phillip L. Wylie
To my loving rock musician boyfriend Jason, my stuffed animal family for assuring me of the rest that I need in order to work effectively, and my late father Michael Crawley for encouraging my very early interest in computers and raising me to write for a living.
Kim Crawley
Phillip L. Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. Phillip has over 23 years of industry experience in disciplines ranging from system administrator, network security engineer, and application security engineer. He has spent the last eight-plus years as a pentester. During his pentesting career, Phillip has performed pentests of networks, wireless networks, and applications, as well as red team operations and social engineering.
Phillip started his career in pentesting as a consultant, where he spent his first five years. These years gave him experience in various environments for Fortune 500 companies in a broad range of industries. Phillip has a passion for mentoring, educating, and helping others. His passion for education and the cybersecurity community motivated him to start teaching and to found The Pwn School Project, a monthly educational meetup focusing on cybersecurity and ethical hacking. His education efforts, however, expanded beyond the classroom and The Pwn School Project. He can be found routinely giving presentations and teaching workshops at cybersecurity conferences.
Phillip teaches Ethical Hacking and Web Application Pentesting at Dallas College in Dallas, TX. Phillip is a co-host for The Uncommon Journey podcast. Phillip has an associate degree in Computer Networking and holds these cybersecurity certifications: CISSP, NSA-IAM, OSCP, and GWAPT. During his system administrator career, Phillip attained these industry certifications; Microsoft MCSE for Windows NT 4.0 and Windows 2000, Novell CNE, and Cisco CCNA.
Kim Crawley is dedicated to researching and writing about a plethora of cybersecurity issues. Some of the companies Kim has worked for over the years include Sophos, AT&T Cybersecurity, BlackBerry Cylance, Tripwire, and Venafi. All matters red team, blue team, and purple team fascinate her. But she's especially fascinated by malware, social engineering, and advanced persistent threats.
Kim's extracurricular activities include running an online cybersecurity event called DisInfoSec and autistic self-advocacy. When she's not working, Kim loves JRPGs (especially the Persona series), trying to cook Japanese and Korean dishes, goth music and fashion, and falling down Wikipedia and TV Tropes rabbit holes.
I thank all of my students and the people I have mentored over the years: You helped me realize my passion for teaching. I thank my friend and fellow adjunct instructor Jason Alvarado for hiring me to teach at Dallas College (formerly Richland College). Teaching Ethical Hacking and Web Application Pentesting helped me discover my love for teaching, which has opened so many doors. I thank my friend and Dallas Hackers Association founder Wirefall for your friendship and for founding the Dallas Hackers Association.
The Dallas Hackers Association was pivotal in getting me involved in the hacking and cybersecurity community. This led to speaking and teaching workshops at cybersecurity conferences, where I have connected with so many amazing people. Thanks to Wirefall, I met Marcus Carey, the author of the
Next pageFont size:
Interval:
Bookmark:
Similar books «The Pentester BluePrint: Starting a Career as an Ethical Hacker»
Look at similar books to The Pentester BluePrint: Starting a Career as an Ethical Hacker. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book The Pentester BluePrint: Starting a Career as an Ethical Hacker and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.