Pen Testing: Planning, Scoping, and Recon
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to begin a penetration testing engagement.
Penetration testing is an important aspect of most cybersecurity programs. Getting started with the right scope, plan, and timeline is an important aspect for a successful engagement. For an effective test, it is equally important to learn about and be familiar with your target so that you can apply this knowledge during the test itself. In this course, Pen Testing: Planning, Scoping, and Recon, you’ll be introduced to the initial phases of a penetration test. First, you’ll explore how we can establish scope and understand the customer's requirements. Next, you'll cover the documents needed for an engagement and why they are important. Finally, you’ll learn how to perform passive reconnaissance. When you’re finished with this course, you’ll have the skills and knowledge to engage and appropriately scope an engagement needed to perform a penetration test.
Penetration testing is an important aspect of most cybersecurity programs. Getting started with the right scope, plan, and timeline is an important aspect for a successful engagement. For an effective test, it is equally important to learn about and be familiar with your target so that you can apply this knowledge during the test itself. In this course, Pen Testing: Planning, Scoping, and Recon, you’ll be introduced to the initial phases of a penetration test. First, you’ll explore how we can establish scope and understand the customer's requirements. Next, you'll cover the documents needed for an engagement and why they are important. Finally, you’ll learn how to perform passive reconnaissance. When you’re finished with this course, you’ll have the skills and knowledge to engage and appropriately scope an engagement needed to perform a penetration test.
Syllabus
- Course Overview 2mins
- Pen Testing - Getting Started 27mins
- Documentation & Legalities 18mins
- Passive Reconnaissance 25mins
Taught by
Alexander Tushinsky
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network