OPSEC for Penetration Testers
Offered By: Pluralsight
Course Description
Overview
This course will teach you what operational security (OPSEC) is, and how to apply proper OPSEC methods to your penetration testing workflow.
Operations security or OPSEC is a topic of security method for helping with the penetration testing workflow. In this course, OPSEC for Penetration Testers, you'll follow the story of a penetration tester that will test the security of a website. In each of the engagement phases, (pre-engagement, the penetration test itself, and post-engagement) the types of data and corresponding risks will be discussed. This includes communication with the stakeholders, a typical pen testers' work environment, as well as the tools being used. Throughout the course, the topics will cover the major scenarios penetration testers face in the real world. By the end of this course, you'll have an understanding of how OPSEC can fit into the penetration testing workflow.
Operations security or OPSEC is a topic of security method for helping with the penetration testing workflow. In this course, OPSEC for Penetration Testers, you'll follow the story of a penetration tester that will test the security of a website. In each of the engagement phases, (pre-engagement, the penetration test itself, and post-engagement) the types of data and corresponding risks will be discussed. This includes communication with the stakeholders, a typical pen testers' work environment, as well as the tools being used. Throughout the course, the topics will cover the major scenarios penetration testers face in the real world. By the end of this course, you'll have an understanding of how OPSEC can fit into the penetration testing workflow.
Syllabus
- Course Overview 1min
- OPSEC and the Penetration Testing Workflow 19mins
- Setting up a Secure Penetration Testing Environment 35mins
- Identifying and Mitigating Risks While Testing 37mins
- Wrapping up Penetration Testing Engagements Securely 23mins
Taught by
Peter Mosmans
Related Courses
Powershell Security Best PracticesMicrosoft via edX The Complete Cyber Security Course : Anonymous Browsing!
Udemy Introduction to Information Security
Pluralsight Cyber Security Base
University of Helsinki via Independent Cybersecurity Foundations
LinkedIn Learning