Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would.
Ethical Hacking: Penetration Testing
4h 43m 59s
English
Paid
The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.
About the Author: pluralsight
At Pluralsight, we believe everyone should have the opportunity to create progress through technology and develop the skills of tomorrow. With assessments, learning paths and courses authored by industry experts, our platform helps businesses and individuals benchmark expertise across roles, speed up release cycles and build reliable, secure products.
Watch Online 78 lessons
0:00
/ #1: Understanding Penetration Testing
All Course Lessons (78)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Understanding Penetration Testing Demo | 04:08 | |
| 2 | Why Do Penetration Tests? | 08:26 | |
| 3 | Types of Pen Tests | 04:01 | |
| 4 | Stage 1: Pre-attack | 16:04 | |
| 5 | Stage 2: Attack | 06:38 | |
| 6 | Stage 3: Post-attack | 01:46 | |
| 7 | Pen Testing Standards | 16:50 | |
| 8 | Summary | 03:11 | |
| 9 | Laying the Foundation | 01:20 | |
| 10 | The Steps to a Successful Pen Test | 06:19 | |
| 11 | Summary | 00:52 | |
| 12 | Intro to Scanning the Target | 01:58 | |
| 13 | Steps to Scan the Target | 06:05 | |
| 14 | Summary | 00:51 | |
| 15 | Intro to Enumerating the Target | 01:47 | |
| 16 | Steps to Enumerate the Target | 07:24 | |
| 17 | Summary | 05:12 | |
| 18 | Intro to Hacking the Target | 03:18 | |
| 19 | Password Cracking | 10:06 | |
| 20 | Privilege Escalation | 02:14 | |
| 21 | Service Accounts | 02:09 | |
| 22 | Hide & Seek Time | 03:33 | |
| 23 | Covering Our Tracks | 01:32 | |
| 24 | Summary | 02:28 | |
| 25 | Intro to Sniffing the Target | 01:50 | |
| 26 | Flooding, Spoofing, & Poisoning | 05:31 | |
| 27 | Summary | 01:57 | |
| 28 | Intro to Social Engineering | 04:33 | |
| 29 | Reconnaissance & Creating the Scenario | 04:14 | |
| 30 | Attacking | 06:16 | |
| 31 | Summary | 01:46 | |
| 32 | Intro to DoS/DDoS the Target | 03:09 | |
| 33 | Outline Objectives | 00:56 | |
| 34 | Load up the Server | 02:17 | |
| 35 | Look for Vulnerabilities & Flooding | 01:34 | |
| 36 | Email-bombing & Flood Web-forms | 01:50 | |
| 37 | Summary | 02:42 | |
| 38 | Intro to Session Hijacking the Target | 02:54 | |
| 39 | Steps to Test for Session Hijacking | 05:31 | |
| 40 | Summary | 01:42 | |
| 41 | Intro to Targeting Web Servers | 03:26 | |
| 42 | Recon Your Targets | 04:12 | |
| 43 | More In-depth Recon | 03:56 | |
| 44 | Summary | 01:51 | |
| 45 | Intro to Hitting the Web Apps | 03:33 | |
| 46 | Define Targets & Gather Information | 03:36 | |
| 47 | Configuration Management Testing | 02:11 | |
| 48 | Authentication Testing | 02:18 | |
| 49 | Session Management Testing | 01:49 | |
| 50 | Authorization Testing | 01:10 | |
| 51 | Data Validation Testing | 03:47 | |
| 52 | Denial of Service Testing | 02:24 | |
| 53 | Web Services Testing | 03:32 | |
| 54 | AJAX Testing | 02:19 | |
| 55 | Summary | 03:21 | |
| 56 | Intro to Looking at the Wi-Fi | 02:31 | |
| 57 | Who's Out There!? | 01:26 | |
| 58 | WEP Testing | 01:07 | |
| 59 | WPA/WPA2 Testing | 02:09 | |
| 60 | General Wi-Fi Testing | 02:08 | |
| 61 | Summary | 01:54 | |
| 62 | Intro to Focusing on the Mobile Devices | 03:16 | |
| 63 | Android Pen Testing | 04:25 | |
| 64 | iPhone Pen Testing | 03:26 | |
| 65 | Windows Phone Pen Testing | 02:41 | |
| 66 | BlackBerry Pen Testing | 04:16 | |
| 67 | Summary | 01:56 | |
| 68 | Intro to Target the Firewall and/or IDS | 02:34 | |
| 69 | Firewall Testing | 04:03 | |
| 70 | IDS Testing | 08:49 | |
| 71 | Summary | 01:20 | |
| 72 | Intro to Going After the Cloud | 02:10 | |
| 73 | It's Not All About You: Before You Begin | 03:30 | |
| 74 | It's Not All About You: The Steps | 06:36 | |
| 75 | Summary | 01:29 | |
| 76 | Intro to How to Bring It All Together | 01:52 | |
| 77 | What's in the Report? | 08:02 | |
| 78 | Summary | 02:00 |
Unlock unlimited learning
Get instant access to all 77 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscription