Network Pen Testing with Python
Offered By: Pluralsight
Course Description
Overview
A thorough assessment of an environment requires
simulating a high volume of offensive techniques within
a fixed time frame. This course will teach you how to
automate penetration testing with Python.
Offensive tools can trigger alerts, lead to early detection, and reveal TTPs and C2 infrastructure. In this course, Network Pen Testing with Python, you’ll learn to automate offensive security techniques with Python. First, you’ll explore Information Gathering and Initial Access. Next, you’ll discover how to conduct post-exploitation with Python. Finally, you’ll learn how to identify opportunities of exfiltrating data.. When you’re finished with this course, you’ll have the skills and knowledge of pen testing automation needed to assess the security controls of an organization.
simulating a high volume of offensive techniques within
a fixed time frame. This course will teach you how to
automate penetration testing with Python.
Offensive tools can trigger alerts, lead to early detection, and reveal TTPs and C2 infrastructure. In this course, Network Pen Testing with Python, you’ll learn to automate offensive security techniques with Python. First, you’ll explore Information Gathering and Initial Access. Next, you’ll discover how to conduct post-exploitation with Python. Finally, you’ll learn how to identify opportunities of exfiltrating data.. When you’re finished with this course, you’ll have the skills and knowledge of pen testing automation needed to assess the security controls of an organization.
Syllabus
- Course Overview 1min
- Initial Access and Network Scanning with Python 35mins
- Post Exploitation with Python 18mins
- Actions on Objectives and Data Exfiltration with Python 28mins
Taught by
Cristian Pascariu
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network