Network Pen Testing with Python
Offered By: Pluralsight
Course Description
Overview
A thorough assessment of an environment requires
simulating a high volume of offensive techniques within
a fixed time frame. This course will teach you how to
automate penetration testing with Python.
Offensive tools can trigger alerts, lead to early detection, and reveal TTPs and C2 infrastructure. In this course, Network Pen Testing with Python, you’ll learn to automate offensive security techniques with Python. First, you’ll explore Information Gathering and Initial Access. Next, you’ll discover how to conduct post-exploitation with Python. Finally, you’ll learn how to identify opportunities of exfiltrating data.. When you’re finished with this course, you’ll have the skills and knowledge of pen testing automation needed to assess the security controls of an organization.
simulating a high volume of offensive techniques within
a fixed time frame. This course will teach you how to
automate penetration testing with Python.
Offensive tools can trigger alerts, lead to early detection, and reveal TTPs and C2 infrastructure. In this course, Network Pen Testing with Python, you’ll learn to automate offensive security techniques with Python. First, you’ll explore Information Gathering and Initial Access. Next, you’ll discover how to conduct post-exploitation with Python. Finally, you’ll learn how to identify opportunities of exfiltrating data.. When you’re finished with this course, you’ll have the skills and knowledge of pen testing automation needed to assess the security controls of an organization.
Syllabus
- Course Overview 1min
- Initial Access and Network Scanning with Python 35mins
- Post Exploitation with Python 18mins
- Actions on Objectives and Data Exfiltration with Python 28mins
Taught by
Cristian Pascariu
Related Courses
Penetration Testing - Post ExploitationNew York University (NYU) via edX Metasploit Framework: Penetration Testing with Metasploit
Udemy Metasploit
Cybrary Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube Advanced Phishing Tactics Beyond User Awareness
YouTube