The Pentester BluePrint

Book description


The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.

Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.

Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:

  • The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems
  • The development of hacking skills and a hacker mindset
  • Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study
  • Which certifications and degrees are most useful for gaining employment as a pentester
  • How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Table of contents

  1. Cover
  2. Title Page
  3. Foreword
  4. Introduction
    1. How I Became a Pentester
    2. Who Should Read This Book
    3. What You Will Learn
    4. How This Book Is Organized
  5. 1 What Is a Pentester?
    1. Synonymous Terms and Types of Hackers
    2. Pentests Described
    3. Pentest Methodology
    4. Pentest Types
    5. Vulnerability Scanning
    6. Vulnerability Assessments
    7. Pentest Targets and Specializations
    8. Career Outlook
    9. Summary
  6. 2 Prerequisite Skills
    1. Skills Required for Learning Pentesting
    2. Information Security Basics
    3. Summary
  7. 3 Education of a Hacker
    1. Hacking Skills
    2. Hacker Mindset
    3. The Pentester Blueprint Formula
    4. Ethical Hacking Areas
    5. Types of Pentesting
    6. A Brief History of Pentesting
    7. Summary
  8. 4 Education Resources
    1. Pentesting Courses
    2. Pentesting Books
    3. Pentesting Labs
    4. Web Resources
    5. Summary
  9. 5 Building a Pentesting Lab
    1. Pentesting Lab Options
    2. Hacking Systems
    3. Popular Pentesting Tools
    4. Hacking Targets
    5. How Pentesters Build Their Labs
    6. Summary
  10. 6 Certifications and Degrees
    1. Pentesting Certifications
    2. Pentesting Training and Coursework
    3. Acquiring Pentesting Credentials
    4. Certification Study Resources
    5. Summary
  11. 7 Developing a Plan
    1. Skills Inventory
    2. Skill Gaps
    3. Action Plan
    4. Summary
  12. 8 Gaining Experience
    1. Capture the Flag
    2. Bug Bounties
    3. A Brief History of Bug Bounty Programs
    4. Pro Bono and Volunteer Work
    5. Internships
    6. Labs
    7. Pentesters on Experience
    8. Summary
  13. 9 Getting Employed as a Pentester
    1. Job Descriptions
    2. Professional Networking
    3. Social Media
    4. Résumé and Interview Tips
    5. Summary
  14. Appendix: The Pentester Blueprint
  15. Glossary
  16. Index
  17. End User License Agreement

Product information

  • Title: The Pentester BluePrint
  • Author(s): Phillip L. Wylie, Kim Crawley
  • Release date: November 2020
  • Publisher(s): Wiley
  • ISBN: 9781119684305