Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Title Page Foreword Introduction
How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized
1 What Is a Pentester?
Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summary
2 Prerequisite Skills
Skills Required for Learning Pentesting Information Security Basics Summary
3 Education of a Hacker
Hacking Skills Hacker Mindset The Pentester Blueprint Formula Ethical Hacking Areas Types of Pentesting A Brief History of Pentesting Summary
4 Education Resources
Pentesting Courses Pentesting Books Pentesting Labs Web Resources Summary
5 Building a Pentesting Lab
Pentesting Lab Options Hacking Systems Popular Pentesting Tools Hacking Targets How Pentesters Build Their Labs Summary
6 Certifications and Degrees
Pentesting Certifications Pentesting Training and Coursework Acquiring Pentesting Credentials Certification Study Resources Summary
7 Developing a Plan
Skills Inventory Skill Gaps Action Plan Summary
8 Gaining Experience
Capture the Flag Bug Bounties A Brief History of Bug Bounty Programs Pro Bono and Volunteer Work Internships Labs Pentesters on Experience Summary
9 Getting Employed as a Pentester
Job Descriptions Professional Networking Social Media Résumé and Interview Tips Summary
Appendix: The Pentester Blueprint Glossary Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion