Ethical Hacking: Penetration Testing
Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would.
More
The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
Watch Online Ethical Hacking: Penetration Testing
# | Title | Duration |
---|---|---|
1 | Understanding Penetration Testing | 04:08 |
2 | Why Do Penetration Tests? | 08:26 |
3 | Types of Pen Tests | 04:01 |
4 | Stage 1: Pre-attack | 16:04 |
5 | Stage 2: Attack | 06:38 |
6 | Stage 3: Post-attack | 01:46 |
7 | Pen Testing Standards | 16:50 |
8 | Summary | 03:11 |
9 | Laying the Foundation | 01:20 |
10 | The Steps to a Successful Pen Test | 06:19 |
11 | Summary | 00:52 |
12 | Intro to Scanning the Target | 01:58 |
13 | Steps to Scan the Target | 06:05 |
14 | Summary | 00:51 |
15 | Intro to Enumerating the Target | 01:47 |
16 | Steps to Enumerate the Target | 07:24 |
17 | Summary | 05:12 |
18 | Intro to Hacking the Target | 03:18 |
19 | Password Cracking | 10:06 |
20 | Privilege Escalation | 02:14 |
21 | Service Accounts | 02:09 |
22 | Hide & Seek Time | 03:33 |
23 | Covering Our Tracks | 01:32 |
24 | Summary | 02:28 |
25 | Intro to Sniffing the Target | 01:50 |
26 | Flooding, Spoofing, & Poisoning | 05:31 |
27 | Summary | 01:57 |
28 | Intro to Social Engineering | 04:33 |
29 | Reconnaissance & Creating the Scenario | 04:14 |
30 | Attacking | 06:16 |
31 | Summary | 01:46 |
32 | Intro to DoS/DDoS the Target | 03:09 |
33 | Outline Objectives | 00:56 |
34 | Load up the Server | 02:17 |
35 | Look for Vulnerabilities & Flooding | 01:34 |
36 | Email-bombing & Flood Web-forms | 01:50 |
37 | Summary | 02:42 |
38 | Intro to Session Hijacking the Target | 02:54 |
39 | Steps to Test for Session Hijacking | 05:31 |
40 | Summary | 01:42 |
41 | Intro to Targeting Web Servers | 03:26 |
42 | Recon Your Targets | 04:12 |
43 | More In-depth Recon | 03:56 |
44 | Summary | 01:51 |
45 | Intro to Hitting the Web Apps | 03:33 |
46 | Define Targets & Gather Information | 03:36 |
47 | Configuration Management Testing | 02:11 |
48 | Authentication Testing | 02:18 |
49 | Session Management Testing | 01:49 |
50 | Authorization Testing | 01:10 |
51 | Data Validation Testing | 03:47 |
52 | Denial of Service Testing | 02:24 |
53 | Web Services Testing | 03:32 |
54 | AJAX Testing | 02:19 |
55 | Summary | 03:21 |
56 | Intro to Looking at the Wi-Fi | 02:31 |
57 | Who's Out There!? | 01:26 |
58 | WEP Testing | 01:07 |
59 | WPA/WPA2 Testing | 02:09 |
60 | General Wi-Fi Testing | 02:08 |
61 | Summary | 01:54 |
62 | Intro to Focusing on the Mobile Devices | 03:16 |
63 | Android Pen Testing | 04:25 |
64 | iPhone Pen Testing | 03:26 |
65 | Windows Phone Pen Testing | 02:41 |
66 | BlackBerry Pen Testing | 04:16 |
67 | Summary | 01:56 |
68 | Intro to Target the Firewall and/or IDS | 02:34 |
69 | Firewall Testing | 04:03 |
70 | IDS Testing | 08:49 |
71 | Summary | 01:20 |
72 | Intro to Going After the Cloud | 02:10 |
73 | It's Not All About You: Before You Begin | 03:30 |
74 | It's Not All About You: The Steps | 06:36 |
75 | Summary | 01:29 |
76 | Intro to How to Bring It All Together | 01:52 |
77 | What's in the Report? | 08:02 |
78 | Summary | 02:00 |