Skip to main content

Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid

Course description

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

Read more about the course

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 78 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Understanding Penetration Testing

All Course Lessons (78)

#Lesson TitleDurationAccess
1
Understanding Penetration Testing Demo
04:08
2
Why Do Penetration Tests?
08:26
3
Types of Pen Tests
04:01
4
Stage 1: Pre-attack
16:04
5
Stage 2: Attack
06:38
6
Stage 3: Post-attack
01:46
7
Pen Testing Standards
16:50
8
Summary
03:11
9
Laying the Foundation
01:20
10
The Steps to a Successful Pen Test
06:19
11
Summary
00:52
12
Intro to Scanning the Target
01:58
13
Steps to Scan the Target
06:05
14
Summary
00:51
15
Intro to Enumerating the Target
01:47
16
Steps to Enumerate the Target
07:24
17
Summary
05:12
18
Intro to Hacking the Target
03:18
19
Password Cracking
10:06
20
Privilege Escalation
02:14
21
Service Accounts
02:09
22
Hide & Seek Time
03:33
23
Covering Our Tracks
01:32
24
Summary
02:28
25
Intro to Sniffing the Target
01:50
26
Flooding, Spoofing, & Poisoning
05:31
27
Summary
01:57
28
Intro to Social Engineering
04:33
29
Reconnaissance & Creating the Scenario
04:14
30
Attacking
06:16
31
Summary
01:46
32
Intro to DoS/DDoS the Target
03:09
33
Outline Objectives
00:56
34
Load up the Server
02:17
35
Look for Vulnerabilities & Flooding
01:34
36
Email-bombing & Flood Web-forms
01:50
37
Summary
02:42
38
Intro to Session Hijacking the Target
02:54
39
Steps to Test for Session Hijacking
05:31
40
Summary
01:42
41
Intro to Targeting Web Servers
03:26
42
Recon Your Targets
04:12
43
More In-depth Recon
03:56
44
Summary
01:51
45
Intro to Hitting the Web Apps
03:33
46
Define Targets & Gather Information
03:36
47
Configuration Management Testing
02:11
48
Authentication Testing
02:18
49
Session Management Testing
01:49
50
Authorization Testing
01:10
51
Data Validation Testing
03:47
52
Denial of Service Testing
02:24
53
Web Services Testing
03:32
54
AJAX Testing
02:19
55
Summary
03:21
56
Intro to Looking at the Wi-Fi
02:31
57
Who's Out There!?
01:26
58
WEP Testing
01:07
59
WPA/WPA2 Testing
02:09
60
General Wi-Fi Testing
02:08
61
Summary
01:54
62
Intro to Focusing on the Mobile Devices
03:16
63
Android Pen Testing
04:25
64
iPhone Pen Testing
03:26
65
Windows Phone Pen Testing
02:41
66
BlackBerry Pen Testing
04:16
67
Summary
01:56
68
Intro to Target the Firewall and/or IDS
02:34
69
Firewall Testing
04:03
70
IDS Testing
08:49
71
Summary
01:20
72
Intro to Going After the Cloud
02:10
73
It's Not All About You: Before You Begin
03:30
74
It's Not All About You: The Steps
06:36
75
Summary
01:29
76
Intro to How to Bring It All Together
01:52
77
What's in the Report?
08:02
78
Summary
02:00

Unlock unlimited learning

Get instant access to all 77 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Decision Making & Principles

Decision Making & Principles

Sources: Logic Room
"Principles and Methods of Decision Making for Lead Engineers" is an advanced course for developers aiming to enhance their skills in team collaboration...
1 hour 13 minutes 30 seconds
Computer Networks

Computer Networks

Sources: takeUforward
This course is a step-by-step immersion into the world of computer networks: from basic concepts and clear examples to complex technologies used in real...
8 hours 28 minutes 4 seconds
Lemon Squeezy Course

Lemon Squeezy Course

Sources: Prodigies University
Learn how to accept payments from over 130 countries where there are restrictions for Stripe. This course will show you alternative solutions and strategies...
1 hour 21 minutes 37 seconds
Super Study Guide: Transformers & Large Language Models

Super Study Guide: Transformers & Large Language Models

Sources: Shervine Amidi, Afshine Amidi
The book "Super Study Guide: Transformers & Large Language Models" is a concise and visual guide for those who want to understand the structure of large...