Pen Testing: Planning, Scoping, and Recon
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to begin a penetration testing engagement.
Penetration testing is an important aspect of most cybersecurity programs. Getting started with the right scope, plan, and timeline is an important aspect for a successful engagement. For an effective test, it is equally important to learn about and be familiar with your target so that you can apply this knowledge during the test itself. In this course, Pen Testing: Planning, Scoping, and Recon, you’ll be introduced to the initial phases of a penetration test. First, you’ll explore how we can establish scope and understand the customer's requirements. Next, you'll cover the documents needed for an engagement and why they are important. Finally, you’ll learn how to perform passive reconnaissance. When you’re finished with this course, you’ll have the skills and knowledge to engage and appropriately scope an engagement needed to perform a penetration test.
Penetration testing is an important aspect of most cybersecurity programs. Getting started with the right scope, plan, and timeline is an important aspect for a successful engagement. For an effective test, it is equally important to learn about and be familiar with your target so that you can apply this knowledge during the test itself. In this course, Pen Testing: Planning, Scoping, and Recon, you’ll be introduced to the initial phases of a penetration test. First, you’ll explore how we can establish scope and understand the customer's requirements. Next, you'll cover the documents needed for an engagement and why they are important. Finally, you’ll learn how to perform passive reconnaissance. When you’re finished with this course, you’ll have the skills and knowledge to engage and appropriately scope an engagement needed to perform a penetration test.
Syllabus
- Course Overview 2mins
- Pen Testing - Getting Started 27mins
- Documentation & Legalities 18mins
- Passive Reconnaissance 25mins
Taught by
Alexander Tushinsky
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent