Similar authors to follow
Manage your follows
About Kim Crawley
Kim Crawley is dedicated to researching and writing about a plethora of cybersecurity issues. She's currently the Blog Manager for Hack The Box, a pioneer in online cybersecurity penetration testing training. Some of the companies Kim has worked for over the years include Sophos, AT&T Cybersecurity, BlackBerry Cylance, Tripwire, and Venafi.
All matters red team, blue team, and purple team fascinate her. But she’s especially fascinated by malware, social engineering, and advanced persistent threats.
Kim’s extracurricular activities include running an online cybersecurity event called DisInfoSec, and autistic self-advocacy. When she’s not working, Kim loves JRPGs (especially the Persona series), trying to cook Japanese and Korean dishes, goth music and fashion, and falling down Wikipedia and TV Tropes rabbit holes.
Kim looks out at the world from a great elevation in a Neo-Futurist skyscraper apartment that's mere feet from the shore of Lake Ontario in Toronto, Canada.
Customers Also Bought Items By
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER
The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.
Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.
Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:
- The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems
- The development of hacking skills and a hacker mindset
- Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study
- Which certifications and degrees are most useful for gaining employment as a pentester
- How to get experience in the pentesting field, including labs, CTFs, and bug bounties
Harden your business against internal and external cybersecurity threats with a single accessible resource.
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to:
- Foster a strong security culture that extends from the custodial team to the C-suite
- Build an effective security team, regardless of the size or nature of your business
- Comply with regulatory requirements, including general data privacy rules and industry-specific legislation
- Test your cybersecurity, including third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.