YoVDO

Security Testing Essential Training

Offered By: LinkedIn Learning

Tags

Penetration Testing Courses Wireshark Courses Kali Linux Courses Nmap Courses Nessus Courses Security Assessment Courses Security Testing Courses

Course Description

Overview

Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.

Syllabus

Introduction
  • The importance of security testing
  • What you should know
1. Understanding Security Assessments
  • Language is important
  • Risk assessments
  • Calculating risk score
  • Security controls assessments
  • NIST and ISO
  • Compliance assessments
  • Vulnerability assessments
  • Penetration tests
  • Goals of a pen test
  • The security assessment lifecycle
2. Your Testing Environment
  • The security tester's toolkit
  • Kali Linux
  • Nmap
  • Nessus
  • Wireshark
  • Lynis
  • CIS-CAT Lite
  • Aircrack-ng
  • Hashcat
  • OWASP ZAP
  • OWASP ZAP demo
3. Planning Your Assessment
  • Understanding your scope
  • Improving over time
  • Selecting your methodology
  • Selecting your tools
  • Basic assessment tools
  • Advanced assessment tools
4. Review Techniques
  • Documentation review
  • Log review
  • Log management tools
  • Ruleset review
  • System configuration review
  • CIS-CAT demo
  • Network sniffing
  • Wireshark demo
  • File integrity checking
5. Identifying Your Targets
  • Network discovery
  • Open-source intelligence
  • Network port and service identification
  • Nmap demo
  • Vulnerability scanning
  • Determining severity
  • Nessus demo
  • Wireless scanning
  • Wireless testing process
  • Aircrack-ng demo
6. Vulnerability Validation
  • Password cracking
  • Hashcat demo
  • Penetration test planning
  • Penetration test tools
  • Penetration test techniques
  • Social engineering
  • SET demo
7. Additional Considerations
  • Coordinating your assessments
  • Data analysis
  • Providing context
  • Data handling
  • Drafting your report
  • Delivering your report
Conclusion
  • Next steps
  • Additional resources

Taught by

Jerod Brennen

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Injection SQL Avec Kali
Coursera Project Network via Coursera
CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools
LinkedIn Learning
Kali Linux on Windows 10 First Look
LinkedIn Learning
Learning Kali Linux
LinkedIn Learning