Becoming an Ethical Hacker
Written by Gary Rivlin
Narrated by Michael David Axtell
4.5/5
()
About this audiobook
It’s impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it’s going, while providing vivid case studies illustrating how to become one of these “white hats” who specializes in ensuring the security of an organization’s information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity.
Gary Rivlin
Gary Rivlin is a Pulitzer Prize–winning investigative reporter and the author of nine books, including Katrina: After the Flood. His work has appeared in the New York Times, Newsweek, Fortune, GQ, and Wired, among other publications. He is a two-time Gerald Loeb Award winner and former reporter for the New York Times. He lives in New York with his wife, theater director Daisy Walker, and two sons.
More audiobooks from Gary Rivlin
Saving Main Street: Small Business in the Time of COVID-19 Rating: 5 out of 5 stars5/5Broke, USA: From Pawnshops to Poverty, Inc.-How the Working Poor Became Big Business Rating: 4 out of 5 stars4/5
Related to Becoming an Ethical Hacker
Related audiobooks
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsHACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsCyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsWorm: The First Digital World War Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsExploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5
Careers For You
Never Eat Alone, Expanded and Updated: And Other Secrets to Success, One Relationship at a Time Rating: 4 out of 5 stars4/5The First 90 Days: Proven Strategies for Getting Up to Speed Faster and Smarter Rating: 5 out of 5 stars5/5The Dictionary of Body Language: A Field Guide to Human Behavior Rating: 5 out of 5 stars5/5What Every BODY is Saying: An Ex-FBI Agent’s Guide to Speed-Reading People Rating: 5 out of 5 stars5/5Quitting: Why I Left My Job to Live a Life of Freedom Rating: 4 out of 5 stars4/5Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career Rating: 4 out of 5 stars4/5Write It Down, Make It Happen: Knowing What You Want And Getting It! Rating: 4 out of 5 stars4/5The Burnout Breakthrough: How to Balance Your Dreams, Responsibilities, and Self-Care Routine Rating: 4 out of 5 stars4/5Nailing the Interview: A Comprehensive Guide to Job Interviewing: A Comprehensive Guide to Job Interviewing Rating: 4 out of 5 stars4/5Designing Your Life by Bill Burnett, Dave Evans - Book Summary: How to Build a Well-Lived, Joyful Life Rating: 4 out of 5 stars4/5Values & Career Alignment Rating: 4 out of 5 stars4/5Real Artists Don't Starve: Timeless Strategies for Thriving in the New Creative Age Rating: 4 out of 5 stars4/5Start.: Punch Fear in the Face, Escape Average, and Do Work That Matters Rating: 5 out of 5 stars5/5Mean Girls at Work: How to Stay Professional When Things Get Personal Rating: 3 out of 5 stars3/5From Paycheck to Purpose: The Clear Path to Doing Work You Love Rating: 5 out of 5 stars5/5Motivated Mindset: Kick Procrastination to the Curb Rating: 5 out of 5 stars5/5Networking with Millionnaires Rating: 4 out of 5 stars4/5The Proximity Principle: The Proven Strategy That Will Lead to the Career You Love Rating: 5 out of 5 stars5/5The 30 Day MBA: Your Fast Track Guide to Business Success Rating: 5 out of 5 stars5/5Overcoming Underearning: A Five-Step Plan to a Richer Life Rating: 4 out of 5 stars4/5Quitter: Closing the Gap Between Your Day Job and Your Dream Job Rating: 4 out of 5 stars4/5Art, Inc.: The Essential Guide for Building Your Career as an Artist Rating: 4 out of 5 stars4/5Start with Your Spark: Creating a Career That Inspires You Rating: 4 out of 5 stars4/5Your Talent Stack: How to Develop Your Skills and Talents, Stand Out, and Thrive in Your Career Rating: 5 out of 5 stars5/5The Unspoken Rules: Secrets to Starting Your Career Off Right Rating: 5 out of 5 stars5/5The Advice Trap: Be Humble, Stay Curious & Change the Way You Lead Forever Rating: 5 out of 5 stars5/5Jump: Take the Leap of Faith to Achieve Your Life of Abundance Rating: 5 out of 5 stars5/5
Reviews for Becoming an Ethical Hacker
24 ratings1 review
- Rating: 5 out of 5 stars5/5I have worked in the IT field and have meet plenty of skilled potential hackers, and others that are so in love with the sound of their own voice, which will try to convince you they are the second coming of Anonymous. But, this book does an excellent job of demonstrating the all to common myth that you need to be a computer prodigy, to be an Ethical Hacker or enter the Cyber Security field, but more importantly someone that has a burning desire to know why, the training will come along as you grow... This is important because I have seen way too many skilled individuals that have completed all the training and certifications only to hit a wall upon graduating. This is a major flaw in the current way of bringing in the next generation of cyber warriors. This book should be mandatory reading for anyone considering Cyber as there career path, very resourceful... without a doubt this book should be the first book in any cyber program, this book covers and points you to the resources. Many of the questions that have come up in the class room are covered in this book, and covers them in detail as they should be...
4 people found this helpful