The Pentester BluePrint: Starting a Career as an Ethical Hacker by Phillip L. Wylie & Kim Crawley
Author:Phillip L. Wylie & Kim Crawley [Wylie, Phillip L. & Crawley, Kim]
Language: eng
Format: epub
ISBN: 9781119684374
Publisher: Wiley
Published: 2020-11-24T00:00:00+00:00
Pentesting Certifications
You have options when it comes to pentesting, and some non-pentesting certifications could still be helpful for aspiring pentesters. Some certifications are well-known with pentesting while others are not. The well-known certifications are typically the ones with which human resources and management are familiar. These pentesting certifications are what we refer to as entry-level credentials.
Entry-Level Certifications
Certified Ethical Hacker
EC-Council's Certified Ethical Hacker (CEH) certification is one of the first ethical hacking certifications and probably one of the most useful ones for finding a job as a pentester. The CEH is a Department of Defense (DoD)ârecognized certification, and it is part of the DoD Directive 8570 certifications. The CEH can be helpful in getting government contracts.
EC-Council prefers that you have two years of pentesting experience before taking the exam, but you can get a lot of that experience from simulating cyberattacks on virtual machines, virtualized networks, and your own devices, as described in Chapter 5, âBuilding a Pentesting Lab.â As of 2020, the current version of the CEH is v10. When taking the exam, you are given four hours to conduct your 125-question exam in a supervised environment and, at the time of this writing, it costs $1,199 USD to take. Here are the modules on the exam to get you started:
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6424)
Kotlin in Action by Dmitry Jemerov(5074)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3850)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3091)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2356)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2267)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2264)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2081)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2000)
