LEADER 04999nam 22006615 450 001 9910865246803321 005 20240701153734.0 010 $a9798868801747$b(electronic bk.) 010 $z9798868801730 024 7 $a10.1007/979-8-8688-0174-7 035 $a(MiAaPQ)EBC31460593 035 $a(Au-PeEL)EBL31460593 035 $a(CKB)32258752700041 035 $a(DE-He213)979-8-8688-0174-7 035 $a(OCoLC)1438947534 035 $a(OCoLC-P)1438947534 035 $a(CaSebORM)9798868801747 035 $a(EXLCZ)9932258752700041 100 $a20240608d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Business of Hacking $eCreating, Developing, and Maintaining an Effective Penetration Testing Team /$fby Michael Butler, Jacob G. Oakley 205 $a1st ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (311 pages) 311 08$aPrint version: Butler, Michael The Business of Hacking Berkeley, CA : Apress L. P.,c2024 9798868801730 327 $aChapter 1: Introduction. -Chapter 2: The Capability -- Chapter 3: Finding and Retaining Talent -- Chapter 4: Team Management -- Chapter 5: Operational Management -- Chapter 6: Developing Hackers -- Chapter 7: Understanding Clients -- Chapter 8: Engagement Management and Security -- Chapter 9: Effective Web and Mobile Application Testing -- Chapter 10: Effective Testing in Cloud Environments -- Chapter 11: Effective Network Testing -- Chapter 12: Reporting -- Chapter 13: The Wedge -- Chapter 14: The Cyber Arms Dealer -- Chapter 15: New Frontiers -- Chapter 16: Infinite Cost Benefit. 330 $aThere is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client?s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you?ll learn How to handle and ongoing develop client relationships in a high end industry Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing. How to identify, understand, and over-deliver on client expectations. How to staff and develop talent within the team. Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities. The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business. 606 $aData protection 606 $aComputer crimes 606 $aRisk management 606 $aData protection$xLaw and legislation 606 $aData and Information Security 606 $aComputer Crime 606 $aSecurity Services 606 $aIT Risk Management 606 $aPrivacy 615 0$aData protection. 615 0$aComputer crimes. 615 0$aRisk management. 615 0$aData protection$xLaw and legislation. 615 14$aData and Information Security. 615 24$aComputer Crime. 615 24$aSecurity Services. 615 24$aIT Risk Management. 615 24$aPrivacy. 676 $a005.8 700 $aButler$b Michael$0600410 701 $aOakley$b Jacob G$01060615 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910865246803321 996 $aThe Business of Hacking$94169457 997 $aUNINA