Ethical Hacking: Penetration Testing
In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network. This course is a 10,000 foot view of penetration testing for the exam.
What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
Course SyllabusUnderstanding Penetration Testing- 1h 0m
—Understanding Penetration Testing 4m 7s
—Why Do Penetration Tests? 8m 25s
—Types of Pen Tests 4m 0s
—Stage 1: Pre-attack 16m 3s
—Stage 2: Attack 6m 37s
—Stage 3: Post-attack 1m 45s
—Pen Testing Standards 16m 49s
—Summary 3m 10sPen Testing: Reconning and/or Footprinting the Target- 8m 28s
—Laying the Foundation 1m 19s
—The Steps to a Successful Pen Test 6m 18s
—Summary 0m 51sPen Testing: Scanning the Target- 8m 51sPen Testing: Enumerating the Target- 14m 20sPen Testing: Hacking the Target- 25m 15sPen Testing: Sniffing the Target- 9m 16sPen Testing: Social Engineering the Target- 16m 46sPen Testing: DoS/DDoS the Target- 12m 25sPen Testing: Session Hijacking the Target- 10m 4sPen Testing: Targeting Web Servers- 13m 23sPen Testing: Hitting Web Apps- 29m 53sPen Testing: Looking at the Wi-Fi- 11m 11sPen Testing: Focusing on the Mobile Devices- 19m 56sPen Testing: Target the Firewall and/or IDS- 16m 44sPen Testing: Going After the Cloud- 13m 43sHow to Bring It All Together- 11m 52s