Description
Penetration testing is one of the best ways to see if your security will hold. Learn the skills you need to identify vulnerabilities in your network, computers, and applications.
You've secured your systems, you've trained your users, and you've fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization.
Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on Kali Linux and introduces techniques for testing web services. At the end of this course, you'll be prepared to take more advanced training, and to pursue the popular Offensive Security Certified Professional (OSCP) certification.
Tags
Syllabus
- Welcome
- What you should know before watching this course
- Course disclaimer
- Pen testing overview
- The cyber kill chain
- An Nmap refresher
- A Netcat refresher
- Capturing packets with tcpdump
- Working with netstat, nbtstat, and arp
- Scripting with PowerShell
- Extending PowerShell with Nishang
- Refreshing your bash skills
- Controlling the flow in a script
- Using functions in bash
- Refreshing your Python skills
- Using the system functions
- Using networking functions
- Working with websites
- Driving Metasploit through Python
- Accessing SQLite databases
- Using Scapy to work with packets
- A Kali refresher
- Fuzzing with Spike
- Information gathering with Sparta
- Adding the Trity tool to Kali
- A refresher on Metasploit
- Exploiting with Armitage
- Scanning targets with OpenVAS
- Approaching web testing
- Testing websites with Burp Suite
- Identifying web vulnerabilites with Nikto
- Fingerprinting webservers
- Exploiting a target
- Understanding code injection
- Understanding buffer overflows
- Finding exploit code
- What's next
Penetration Testing Essential Training
-
TypeOnline Course
-
Provider
You've secured your systems, you've trained your users, and you've fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization.
Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on Kali Linux and introduces techniques for testing web services. At the end of this course, you'll be prepared to take more advanced training, and to pursue the popular Offensive Security Certified Professional (OSCP) certification.
- Welcome
- What you should know before watching this course
- Course disclaimer
- Pen testing overview
- The cyber kill chain
- An Nmap refresher
- A Netcat refresher
- Capturing packets with tcpdump
- Working with netstat, nbtstat, and arp
- Scripting with PowerShell
- Extending PowerShell with Nishang
- Refreshing your bash skills
- Controlling the flow in a script
- Using functions in bash
- Refreshing your Python skills
- Using the system functions
- Using networking functions
- Working with websites
- Driving Metasploit through Python
- Accessing SQLite databases
- Using Scapy to work with packets
- A Kali refresher
- Fuzzing with Spike
- Information gathering with Sparta
- Adding the Trity tool to Kali
- A refresher on Metasploit
- Exploiting with Armitage
- Scanning targets with OpenVAS
- Approaching web testing
- Testing websites with Burp Suite
- Identifying web vulnerabilites with Nikto
- Fingerprinting webservers
- Exploiting a target
- Understanding code injection
- Understanding buffer overflows
- Finding exploit code
- What's next