Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

Read more about the course

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online Ethical Hacking: Penetration Testing

Join premium to watch
Go to premium
# Title Duration
1 Understanding Penetration Testing 04:08
2 Why Do Penetration Tests? 08:26
3 Types of Pen Tests 04:01
4 Stage 1: Pre-attack 16:04
5 Stage 2: Attack 06:38
6 Stage 3: Post-attack 01:46
7 Pen Testing Standards 16:50
8 Summary 03:11
9 Laying the Foundation 01:20
10 The Steps to a Successful Pen Test 06:19
11 Summary 00:52
12 Intro to Scanning the Target 01:58
13 Steps to Scan the Target 06:05
14 Summary 00:51
15 Intro to Enumerating the Target 01:47
16 Steps to Enumerate the Target 07:24
17 Summary 05:12
18 Intro to Hacking the Target 03:18
19 Password Cracking 10:06
20 Privilege Escalation 02:14
21 Service Accounts 02:09
22 Hide & Seek Time 03:33
23 Covering Our Tracks 01:32
24 Summary 02:28
25 Intro to Sniffing the Target 01:50
26 Flooding, Spoofing, & Poisoning 05:31
27 Summary 01:57
28 Intro to Social Engineering 04:33
29 Reconnaissance & Creating the Scenario 04:14
30 Attacking 06:16
31 Summary 01:46
32 Intro to DoS/DDoS the Target 03:09
33 Outline Objectives 00:56
34 Load up the Server 02:17
35 Look for Vulnerabilities & Flooding 01:34
36 Email-bombing & Flood Web-forms 01:50
37 Summary 02:42
38 Intro to Session Hijacking the Target 02:54
39 Steps to Test for Session Hijacking 05:31
40 Summary 01:42
41 Intro to Targeting Web Servers 03:26
42 Recon Your Targets 04:12
43 More In-depth Recon 03:56
44 Summary 01:51
45 Intro to Hitting the Web Apps 03:33
46 Define Targets & Gather Information 03:36
47 Configuration Management Testing 02:11
48 Authentication Testing 02:18
49 Session Management Testing 01:49
50 Authorization Testing 01:10
51 Data Validation Testing 03:47
52 Denial of Service Testing 02:24
53 Web Services Testing 03:32
54 AJAX Testing 02:19
55 Summary 03:21
56 Intro to Looking at the Wi-Fi 02:31
57 Who's Out There!? 01:26
58 WEP Testing 01:07
59 WPA/WPA2 Testing 02:09
60 General Wi-Fi Testing 02:08
61 Summary 01:54
62 Intro to Focusing on the Mobile Devices 03:16
63 Android Pen Testing 04:25
64 iPhone Pen Testing 03:26
65 Windows Phone Pen Testing 02:41
66 BlackBerry Pen Testing 04:16
67 Summary 01:56
68 Intro to Target the Firewall and/or IDS 02:34
69 Firewall Testing 04:03
70 IDS Testing 08:49
71 Summary 01:20
72 Intro to Going After the Cloud 02:10
73 It's Not All About You: Before You Begin 03:30
74 It's Not All About You: The Steps 06:36
75 Summary 01:29
76 Intro to How to Bring It All Together 01:52
77 What's in the Report? 08:02
78 Summary 02:00

Similar courses to Ethical Hacking: Penetration Testing

How to Build a Micro SaaS That Makes Money & Earns Recurring Revenue

How to Build a Micro SaaS That Makes Money & Earns Recurring RevenueJamie Tam

Category: Others
Duration 7 hours 13 minutes 56 seconds
Natural Language Preprocessing

Natural Language PreprocessingLunarTech

Category: Others
Duration 58 minutes 50 seconds
Web Security & Bug Bounty Learn Penetration Testing in 2023

Web Security & Bug Bounty Learn Penetration Testing in 2023zerotomastery.io

Category: Others, Other (QA)
Duration 10 hours 28 minutes 11 seconds
Systems Design Fundamentals

Systems Design Fundamentalsalgoexpert

Category: Others
Duration 10 hours 2 minutes 52 seconds
100 MENTAL MODELS & THINK BETTER

100 MENTAL MODELS & THINK BETTERWisdom Theory

Category: Others
Duration 38 hours 58 minutes 27 seconds
Introduction to RAG

Introduction to RAGDAIR.AI

Category: Others
Duration 2 hours 23 minutes 5 seconds
Break Into Tech And Become A Software Engineer

Break Into Tech And Become A Software EngineerBrian Jenney

Category: Others
Duration 1 hour 49 minutes 25 seconds
Digital Project Management

Digital Project Managementsuperhi.com

Category: Others
Duration 17 hours 53 minutes 30 seconds
Programming Language with LLVM

Programming Language with LLVMDmitry Soshnikov

Category: Others
Duration 2 hours 46 minutes 4 seconds
Automata Theory: inside a RegExp machine

Automata Theory: inside a RegExp machineDmitry Soshnikov

Category: Others
Duration 1 hour 48 minutes 5 seconds