Ethical Hacking: Penetration Testing
Offered By: LinkedIn Learning
Course Description
Overview
Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
Syllabus
Introduction
- Testing an organization's defenses
- Getting the most out of this course
- Understanding penetration testing
- Auditing security mechanisms
- Managing risk
- Analyzing risk
- Recognizing the attack surface
- Comparing different environments
- Checking from the outside in
- Looking inside the organization
- Determining testing methods
- Discovering pen testing tools
- Challenge: Explain the NIST five framework core functions
- Solution: Explain the NIST five framework core functions
- Following a structured plan
- Planning the pen test
- Footprinting the target
- Escalating privileges
- Attacking the system
- Delivering the results
- Outlining remediation strategies
- Checking physical security
- Identifying wireless vulnerabilities
- Testing the website
- Leaking data via email or VoIP
- Safeguarding cloud services
- Assessing the mobile infrastructure
- Hacking the human
- Contracting the pen test
- Defining the project scope
- Hiring consultants
- Agreeing on terms
- Creating the contracts
- What's next
Taught by
Lisa Bock
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera