SitePoint
  • Premium
  • Library
  • Community
  • Jobs
  • Blog
LoginStart Free Trial

The home for developers

Track your course progress, manage projects, and find your dream job - all in one place.

Start Your Free Trial

7 Day Free Trial. Cancel Anytime.

SitePoint Premium

  • Access to 700+ courses
  • Publish articles on SitePoint
  • Daily curated jobs
  • Learning Paths
  • Discounts to dev tools
  • Library/
  • Text courses/
  • Hacking For Dummies
Hacking For Dummies

Hacking For Dummies


Course details

4.0∙3 Ratings0 reviews

Published
June 2018
Publisher
Wiley
Chapters
24

About the course

In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.

Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease.

  • Get up to speed on Windows 10 hacks
  • Learn about the latest mobile computing hacks
  • Get free testing tools
  • Find out about new system updates and improvements

There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.

Author

Kevin Beaver

Kevin Beaver

Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta-based Principle Logic, LLC. He has over three decades of experience in IT and has spent a quarter of a century working in security. Kevin specializes in performing independent information security assessments for corporations, security product vendors, software developers/cloud service providers, government agencies, nonprofit organizations, among others. Before starting his information security consulting practice in 2001, Kevin served in various information technology (IT) and security roles for several healthcare, e-commerce, financial, and educational institutions.

Course Outline

Chapter 1: Introduction to Vulnerability and Penetration Testing
Chapter 2: Cracking the Hacker Mindset
Chapter 3: Developing Your Security Testing Plan
Chapter 4: Hacking Methodology
Chapter 5: Information Gathering
Chapter 6: Social Engineering
Chapter 7: Physical Security
Chapter 8: Passwords
Chapter 9: Network Infrastructure Systems
Chapter 10: Wireless Networks
Chapter 11: Mobile Devices
Chapter 12: Windows
Chapter 13: Linux and macOS
Chapter 14: Communication and Messaging Systems
Chapter 15: Web Applications and Mobile Apps
Chapter 16: Databases and Storage Systems
Chapter 17: Reporting Your Results
Chapter 18: Plugging Your Security Holes
Chapter 19: Managing Security Processes
Chapter 20: Ten Tips for Getting Security Buy-In
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
Chapter 22: Ten Deadly Mistakes
Chapter 23: Appendix: Tools and Resources
Chapter 24: Index

Reviews
4.0

3 total

0
3
0
0
0

Course details

4.0∙3 Ratings0 reviews

Published
June 2018
Publisher
Wiley
Chapters
24

SitePoint

Stuff we do

  • Premium
  • Newsletters
  • Learning paths
  • Library
  • Forums

Contact

  • Contact us
  • FAQ
  • Publish your book
  • Write an article
  • Advertise

About

  • Our Story
  • Corporate Memberships
  • Start free trial
  • Login

Connect

  • RSS
  • Facebook
  • Twitter (X)
  • Instagram

Subscribe to our newsletter

Get the freshest news and resources for developers, designers and digital creators in your inbox each week

© 2000 – 2025 SitePoint Pty. Ltd.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Terms of usePrivacy policy