0
نام کتاب
The Business of Hacking

Creating, Developing, and Maintaining an Effective Penetration Testing Team

Michael Butler, Jacob G. Oakley

Paperback320 Pages
PublisherApress
Edition1
LanguageEnglish
Year2024
ISBN9798868801730
708
A5184
انتخاب نوع چاپ:
جلد سخت
634,000ت
0
جلد نرم
554,000ت
0
طلق پاپکو و فنر
564,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:دارای متن و کادر رنگی
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Hacking

#Penetration_Testing

#Cybersecurity

توضیحات

There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.


The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience.

The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions.


What you’ll learn

  • How to handle and ongoing develop client relationships in a high end industry
  • Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.
  • How to identify, understand, and over-deliver on client expectations.
  • How to staff and develop talent within the team.
  • Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.
  • The various structures of services available that they may present to their clients.


Who This Book Is For

This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.


Table of Contents

Chapter 1: Introduction

Chapter 2: The Service

Chapter 3: Finding and Retaining Talent

Chapter 4: Team Management

Chapter 5: Operational Management

Chapter 6: Developing Hackers

Chapter 7: Understanding Clients

Chapter 8: Engagement Security

Chapter 9: Effective Web and Mobile Application Testing

Chapter 10: Effective Testing in Cloud Environments

Chapter 11: Effective Network Testing

Chapter 12: Reporting

Chapter 13: The Wedge

Chapter 14: Cyber Arms Dealing

Chapter 15: New Frontiers

Chapter 16: Infinite Cost Benefit


About the Authors

Michael Butler is a cybersecurity subject matter expert with 12 years of experience focusing on building, developing, and leading teams of ethical hackers. He is a primary instructor and developer of an offensive cloud security course taught both privately and at Blackhat conferences in the United States, Europe, and Asia. He has previously collaborated with Dr. Oakley as the technical reviewer for Professional Red Teaming and is the co-author of Theoretical Cybersecurity: Principles and Advanced Concepts (Apress, 2022).


Dr. Jacob G. Oakley is a cybersecurity author and subject matter expert with 16 years of experience focusing on strategic enterprise level cybersecurity architectures as well as offensive cybersecurity operations within government and commercial sectors. His previous technical books, Theoretical Cybersecurity, Professional Red TeamingWaging Cyber War, and Cybersecurity for Space, are also published by Apress. Cybersecurity Engagements, as well as Waging Cyber War: Technical Challenges and Operational Constraints.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
1,280
Blue Fox Arm Assembly Internals & Reverse Engineering
742,000 تومان
هک و امنیت
613
Inside Cyber Warfare
364,000 تومان
هک و امنیت
1,046
CEH : Certified Ethical Hacker Practice Exams
593,000 تومان
هک و امنیت
948
Security and Privacy Vision in 6G
635,000 تومان
هک و امنیت
1,189
The Art of Memory Forensics
1,437,000 تومان
هک و امنیت
398
OSINT Techniques
1,225,000 تومان
لینوکس
1,123
Linux Server Security
331,000 تومان
هک و امنیت
539
Security Architecture for Hybrid Cloud
743,000 تومان
هک و امنیت
956
Dynamically Enabled Cyber Defense
637,000 تومان
هک و امنیت
1,139
Network Security Strategies
624,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©