Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

Read more about the course

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online Ethical Hacking: Penetration Testing

Join premium to watch
Go to premium
# Title Duration
1 Understanding Penetration Testing 04:08
2 Why Do Penetration Tests? 08:26
3 Types of Pen Tests 04:01
4 Stage 1: Pre-attack 16:04
5 Stage 2: Attack 06:38
6 Stage 3: Post-attack 01:46
7 Pen Testing Standards 16:50
8 Summary 03:11
9 Laying the Foundation 01:20
10 The Steps to a Successful Pen Test 06:19
11 Summary 00:52
12 Intro to Scanning the Target 01:58
13 Steps to Scan the Target 06:05
14 Summary 00:51
15 Intro to Enumerating the Target 01:47
16 Steps to Enumerate the Target 07:24
17 Summary 05:12
18 Intro to Hacking the Target 03:18
19 Password Cracking 10:06
20 Privilege Escalation 02:14
21 Service Accounts 02:09
22 Hide & Seek Time 03:33
23 Covering Our Tracks 01:32
24 Summary 02:28
25 Intro to Sniffing the Target 01:50
26 Flooding, Spoofing, & Poisoning 05:31
27 Summary 01:57
28 Intro to Social Engineering 04:33
29 Reconnaissance & Creating the Scenario 04:14
30 Attacking 06:16
31 Summary 01:46
32 Intro to DoS/DDoS the Target 03:09
33 Outline Objectives 00:56
34 Load up the Server 02:17
35 Look for Vulnerabilities & Flooding 01:34
36 Email-bombing & Flood Web-forms 01:50
37 Summary 02:42
38 Intro to Session Hijacking the Target 02:54
39 Steps to Test for Session Hijacking 05:31
40 Summary 01:42
41 Intro to Targeting Web Servers 03:26
42 Recon Your Targets 04:12
43 More In-depth Recon 03:56
44 Summary 01:51
45 Intro to Hitting the Web Apps 03:33
46 Define Targets & Gather Information 03:36
47 Configuration Management Testing 02:11
48 Authentication Testing 02:18
49 Session Management Testing 01:49
50 Authorization Testing 01:10
51 Data Validation Testing 03:47
52 Denial of Service Testing 02:24
53 Web Services Testing 03:32
54 AJAX Testing 02:19
55 Summary 03:21
56 Intro to Looking at the Wi-Fi 02:31
57 Who's Out There!? 01:26
58 WEP Testing 01:07
59 WPA/WPA2 Testing 02:09
60 General Wi-Fi Testing 02:08
61 Summary 01:54
62 Intro to Focusing on the Mobile Devices 03:16
63 Android Pen Testing 04:25
64 iPhone Pen Testing 03:26
65 Windows Phone Pen Testing 02:41
66 BlackBerry Pen Testing 04:16
67 Summary 01:56
68 Intro to Target the Firewall and/or IDS 02:34
69 Firewall Testing 04:03
70 IDS Testing 08:49
71 Summary 01:20
72 Intro to Going After the Cloud 02:10
73 It's Not All About You: Before You Begin 03:30
74 It's Not All About You: The Steps 06:36
75 Summary 01:29
76 Intro to How to Bring It All Together 01:52
77 What's in the Report? 08:02
78 Summary 02:00

Similar courses to Ethical Hacking: Penetration Testing

Lead Generation for SAAS

Lead Generation for SAASProdigies University

Category: Others
Duration 1 hour 10 minutes 34 seconds
Essential Poker Math for No Limit Holdem

Essential Poker Math for No Limit Holdemudemy

Category: Others
Duration 9 hours 49 minutes 5 seconds
Complete Guide to Protocol Buffers 3 [Java, Golang, Python]

Complete Guide to Protocol Buffers 3 [Java, Golang, Python]udemy

Category: Others
Duration 3 hours 53 minutes 59 seconds
Building a Transpiler from scratch

Building a Transpiler from scratchDmitry Soshnikov

Category: Others
Duration 2 hours 3 seconds
AlgoExpert | Become an Algorithms Expert

AlgoExpert | Become an Algorithms Expertalgoexpert

Category: Others
Duration 116 hours 40 minutes 8 seconds
Bug Bounty - An Advanced Guide to Finding Good Bugs

Bug Bounty - An Advanced Guide to Finding Good Bugsudemy

Category: Others, Ethical Hacking / Penetration Testing
Duration 10 hours 26 seconds
Classic Season 1

Classic Season 1destroyallsoftware

Category: Others
Duration 4 hours 10 minutes 48 seconds
Natural Language Preprocessing

Natural Language PreprocessingLunarTech

Category: Others
Duration 58 minutes 50 seconds
Fundamentals of Operating Systems

Fundamentals of Operating Systemsudemy

Category: Others
Duration 21 hours 41 minutes 1 second