Ethical Hacking: Penetration Testing
Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.
What’s penetration testing?
Well it’s simple, as security professionals our job is to make it extremely difficult to get inside our systems.
Remember, you can’t stop attackers, your job is to slow them down.
How?
Let’s start by doing exactly what the attacker will do.
Penetration testing (pen testing) is the practice of attacking your own network or that of a client’s, using the same tools, techniques, and steps that an attacker would.
The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage.
In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
Author Name: Dale Meredith
Author Description:
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale’s expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale’s instruction is memorable and entertaining. Dale’s knowl… more
Table of Contents
- Understanding Penetration Testing
60mins - Pen Testing: Reconning and/or Footprinting the Target
8mins - Pen Testing: Scanning the Target
8mins - Pen Testing: Enumerating the Target
14mins - Pen Testing: Hacking the Target
25mins - Pen Testing: Sniffing the Target
9mins - Pen Testing: Social Engineering the Target
16mins - Pen Testing: DoS/DDoS the Target
12mins - Pen Testing: Session Hijacking the Target
10mins - Pen Testing: Targeting Web Servers
13mins - Pen Testing: Hitting Web Apps
29mins - Pen Testing: Looking at the Wi-Fi
11mins - Pen Testing: Focusing on the Mobile Devices
19mins - Pen Testing: Target the Firewall and/or IDS
16mins - Pen Testing: Going After the Cloud
13mins - How to Bring It All Together
11mins
There are no reviews yet.