Ethical Hacking: Penetration Testing
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of
EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.
Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.
Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
Syllabus
- Understanding Penetration Testing 60mins
- Pen Testing: Reconning and/or Footprinting the Target 8mins
- Pen Testing: Scanning the Target 8mins
- Pen Testing: Enumerating the Target 14mins
- Pen Testing: Hacking the Target 25mins
- Pen Testing: Sniffing the Target 9mins
- Pen Testing: Social Engineering the Target 16mins
- Pen Testing: DoS/DDoS the Target 12mins
- Pen Testing: Session Hijacking the Target 10mins
- Pen Testing: Targeting Web Servers 13mins
- Pen Testing: Hitting Web Apps 29mins
- Pen Testing: Looking at the Wi-Fi 11mins
- Pen Testing: Focusing on the Mobile Devices 19mins
- Pen Testing: Target the Firewall and/or IDS 16mins
- Pen Testing: Going After the Cloud 13mins
- How to Bring It All Together 11mins
Taught by
Dale Meredith
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX