top of page

Related Courses

Security Penetration Testing Course & PDF Guides

Price: 4.00 USD | Size: 4.36 GB | Duration : 10+ Hours | 78 Lessons | 

BRAND : Expert TRAINING | ENGLISH | Free PDF Guides |INSTANT DOWNLOAD

 

 

Security Penetration Testing Course & PDF Guides

 

Introduction

Security Penetration Testing The Art of Hacking Series LiveLessons: Introduction

Lesson 1: Overview of Ethical Hacking and Penetration Testing

1.0 Learning objectives

1.1 Introducing Ethical Hacking and Pen Testing

1.2 Getting Started with Ethical Hacking and Pen Testing

1.3 Understanding the Legal Aspects of Penetration Testing

1.4 Exploring Penetration Testing Methodologies

1.5 Exploring Penetration Testing and other Cyber Security Certifications

1.6 Building Your Own Lab: Overview

1.7 Building Your Own Lab: VIRL and Operating System Software

1.8 Understanding Vulnerabilities, Threats, and Exploits

1.9 Understanding the Current Threat Landscape

Lesson 2: Kali Linux

2.0 Learning objectives

2.1 Installing Kali

2.2 Examining Kali Modules and Architecture

2.3 Managing Kali Services

Lesson 3: Passive Reconnaissance

3.0 Learning objectives

3.1 Understanding Passive Reconnaissance

3.2 Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information

3.3 Exploring Passive Reconnaissance Methodologies: Searching for Files

3.4 Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information

3.5 Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover

3.6 Surveying Essential Tools for Passive Reconnaissance: Recon-ng

Lesson 4: Active Reconnaissance

4.0 Learning objectives

4.1 Understanding Active Reconnaissance

4.2 Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective

4.3 Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review

4.4 Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners

Lesson 5: Hacking Web Applications

5.0 Learning objectives

5.1 Understanding Web Applications

5.2 Understanding Web Architectures

5.3 Uncovering Web Vulnerabilities

5.4 Testing Web Applications: Methodology

5.5 Testing Web Applications: Reconnaissance

5.6 Testing Web Applications: Mapping

5.7 Testing Web Applications: Vulnerability Discovery

5.8 Understanding the Exploitation of Web Applications

5.9 Surveying Defenses to Mitigate Web Application Hacking

Lesson 6: Hacking User Credentials

6.0 Learning objectives

6.1 Understanding Authentication and Authorization Mechanisms

6.2 Understanding Authentication and Authorization Attacks

6.3 Exploring Password Storage Mechanisms

6.4 Understanding Password Storage Vulnerability

6.5 Cracking Passwords with John the Ripper

6.6 Cracking Passwords with hashcat

6.7 Improving Password Security

Lesson 7: Hacking Databases

7.0 Learning objectives

7.1 Reviewing Database Fundamentals

7.2 Attacking a Database: Discovery, Validation, and Exploitation

7.3 Attacking a Database: Automated Scanners

7.4 Surveying Defenses to Mitigate Database Hacking

Lesson 8: Hacking Networking Devices

8.0 Learning objectives

8.1 Understanding the Reasons for and the Steps to Hacking a Network

8.2 Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models

8.3 Reviewing Networking Technology Fundamentals: Forwarding Device Architecture and Communication

8.4 Building an Internetwork Topology Using VIRL

8.5 Hacking Switches: Reviewing Ethernet Fundamentals

8.6 Hacking Switches: Demo

8.7 Hacking Switches: ARP Vulnerabilities and ARP Cache Poisoning

8.8 Reviewing Router Fundamentals

8.9 Examining ICMP, First Hop Redundancy and Routing Protocol Attacks

8.10 Hacking the Management Plane

8.11 Understanding Firewall Fundamentals and Levels of Inspection

8.12 Performing Firewall Reconnaissance and Tunneling

8.13 Surveying Essential Tools for Hacking Network Devices: Packet Capture

8.14 Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools

8.15 Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools

8.16 Surveying Essential Tools for Hacking Network Devices: MiTM Tools

8.17 Surveying Essential Tools for Hacking Network Devices: Linux Tools

8.18 Using Network Device Hacking Tools to Perform a MiTM Attack

Lesson 9: Fundamentals of Wireless Hacking

9.0 Learning objectives

9.1 Reviewing Wireless Technology Fundamentals

9.2 Surveying Wireless Hacking Tools: Wireless Adapters

9.3 Surveying Wireless Hacking Tools: Software

9.4 Hacking WEP, WPA, and Other Protocols

9.5 Understanding Hacking Wireless Clients

Lesson 10: Buffer Overflows

10.0 Learning objectives

10.1 Understanding Buffer Overflows

10.2 Exploiting Buffer Overflows

10.3 Overcoming Defenses for Buffer Overflow Vulnerabilities

10.4 Understanding Fuzzing

10.5 Creating a Fuzzing Strategy

10.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers

10.7 Surveying Tools to Find and Exploit Buffer Overflows

Lesson 11: Powershell Attacks

11.0 Learning objectives

11.1 Understanding Powershell

11.2 Pwning Windows Using PowerShell: Empire Components, Setup, and Basic Exploits

11.3 Pwning Windows Using PowerShell: Empire Modules and Advanced Exploits

11.4 Gathering Network Information Using PowerShell

Lesson 12: Evasion and Post Exploitation Techniques

12.0 Learning objectives

12.1 Understanding Security Evasion Techniques

12.2 Exploring Post Exploitation Techniques

12.3 Covering Your Tracks

Lesson 13: Social Engineering

13.0 Learning objectives

13.1 Understanding Social Engineering

13.2 Exploring the Social Engineering Toolkit (SET)

13.3 Exploring Maltego

13.4 Surveying Social Engineering Case Studies

Lesson 14: Maintaining Persistence, Pivoting, and Data Exfiltration

14.0 Learning objectives

14.1 Understanding Persistence

14.2 Gaining Network Access

14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and LLMNR Poisoning

14.4 Maintaining Persistence

14.5 Understanding Pivoting and Lateral Movement

14.6 Defending Against the Advanced Persistent Threat

Lesson 15: Writing Penetration Testing Reports

15.0 Learning objectives

15.1 Understanding Pen Test Reports and How They Are Used

15.2 Planning and Organizing Your Report

15.3 Understanding the Pen Test Report Format

15.4 Exploring Risk Ratings

15.5 Distributing Pen Test Reports

Summary

Security Penetration Testing The Art of Hacking Series LiveLessons: Summary

Security Penetration Testing Course & PDF Guides

SKU: EXTRS172214
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links

bottom of page