Advanced Penetration Testing for HighlySecured Environments
An intensive hands-on course to perform professional penetration testing
An intensive hands-on course to perform professional penetration testing
About This Video
- Learn how to perform an efficient, organized, and effective penetration test from start to finish
- Explore advanced techniques to bypass firewalls and IDS, and remain hidden
- Discover advanced exploitation methods on even the most updated systems
In Detail
The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.
Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.
The goal of this video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more.
To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.
If you are looking to practice your network security skills as a penetration testing, through exploitation techniques and strategies, then this video course is for you.
Style and Approach
Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done.
This video course takes a progressive approach by first unravelling security techniques and then applying these techniques in a fictional environment. It is thoroughly educational and gives users the opportunity to test their skills.
Get Advanced Penetration Testing for HighlySecured Environments – Packt Publishing, Only Price $37
Course Curriculum
Introduction to Advanced Penetration Testing
- What Is Advanced Penetration Testing? (3:43)
- Installing VirtualBox (4:42)
- Installing BackTrack 5 R3 (4:25)
- Installing Metasploitable (2:47)
- Set up BackTrack 5 R3 (4:12)
Advanced Footprinting
- What Is Footprinting? (3:05)
- Using Nslookup and Dig (4:13)
- Using Tracert and Traceroute (4:35)
- Using Paterva Maltego (4:47)
- Google Dorks and Social Engineering (5:16)
Enumeration: Getting to Know Your Target
- What Is Enumeration? (2:32)
- Using Nmap and Zenmap (6:07)
- Using SNMPenu and SNMPwalk (4:51)
- Banner Grabbing with Netcat (3:36)
- Searching for Exploits (3:30)
Exploitation Applications: Getting to Know Your Tools
- What Is Exploitation? (4:18)
- Installing the Nessus Vulnerability Scanner (4:21)
- Using the Nessus Vulnerability Scanner-Part 1 (4:52)
- Installing and Updating the Metasploit Framework (2:57)
- Using the Metasploit Framework (7:32)
Gaining Physical Access
- How Do Hackers Break into a Local System? (3:27)
- Breaking into Windows 7-Part 1 (2:48)
- Breaking into Windows 7-Part 2 (3:00)
- Breaking into Windows 7-Part 3 (4:31)
- Breaking into Windows 7-Part 4 (2:28)
Exploiting a Client-side Target
- How Do Hackers Break into a Remote System? (5:27)
- Using the Social Engineering Toolkit (4:00)
- Using the Nessus Vulnerability Scanner-Part 2 (5:14)
- Exploiting Windows 7 (5:04)
- Exploiting Metasploitable (5:42)
Bypassing Web Filters, Firewalls, and IDS
- Evading Web Filters, Firewalls, and IDSes (5:38)
- Bypassing Web Filters-Part 1 (5:21)
- Bypassing Web Filters-Part 2 (3:39)
- Stealth Scanning-Part 1 (2:32)
- Stealth Scanning-Part 2 (4:49)
Writing a Penetration Testing Report
- Why Is It So Important to Write a Report? (4:28)
- What Should Be In the Report? (3:55)
- Writing a Report (4:43)
- Turning In the Report (3:14)
- Final Statement by the Author (4:26)
Get Advanced Penetration Testing for HighlySecured Environments – Packt Publishing, Only Price $37
Tag: Advanced Penetration Testing for HighlySecured Environments – Packt Publishing Review. Advanced Penetration Testing for HighlySecured Environments – Packt Publishing download. Advanced Penetration Testing for HighlySecured Environments – Packt Publishing discount.
Reviews
There are no reviews yet.