Ethical Hacking: Penetration Testing
Offered By: LinkedIn Learning
Course Description
Overview
Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
Syllabus
Introduction
- Testing an organization's defenses
- Getting the most out of this course
- Understanding penetration testing
- Auditing security mechanisms
- Managing risk
- Analyzing risk
- Recognizing the attack surface
- Comparing different environments
- Checking from the outside in
- Looking inside the organization
- Determining testing methods
- Discovering pen testing tools
- Challenge: Explain the NIST five framework core functions
- Solution: Explain the NIST five framework core functions
- Following a structured plan
- Planning the pen test
- Footprinting the target
- Escalating privileges
- Attacking the system
- Delivering the results
- Outlining remediation strategies
- Checking physical security
- Identifying wireless vulnerabilities
- Testing the website
- Leaking data via email or VoIP
- Safeguarding cloud services
- Assessing the mobile infrastructure
- Hacking the human
- Contracting the pen test
- Defining the project scope
- Hiring consultants
- Agreeing on terms
- Creating the contracts
- What's next
Taught by
Lisa Bock
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent