Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid
October 31, 2024

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

More

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online Ethical Hacking: Penetration Testing

Join premium to watch
Go to premium
# Title Duration
1 Understanding Penetration Testing 04:08
2 Why Do Penetration Tests? 08:26
3 Types of Pen Tests 04:01
4 Stage 1: Pre-attack 16:04
5 Stage 2: Attack 06:38
6 Stage 3: Post-attack 01:46
7 Pen Testing Standards 16:50
8 Summary 03:11
9 Laying the Foundation 01:20
10 The Steps to a Successful Pen Test 06:19
11 Summary 00:52
12 Intro to Scanning the Target 01:58
13 Steps to Scan the Target 06:05
14 Summary 00:51
15 Intro to Enumerating the Target 01:47
16 Steps to Enumerate the Target 07:24
17 Summary 05:12
18 Intro to Hacking the Target 03:18
19 Password Cracking 10:06
20 Privilege Escalation 02:14
21 Service Accounts 02:09
22 Hide & Seek Time 03:33
23 Covering Our Tracks 01:32
24 Summary 02:28
25 Intro to Sniffing the Target 01:50
26 Flooding, Spoofing, & Poisoning 05:31
27 Summary 01:57
28 Intro to Social Engineering 04:33
29 Reconnaissance & Creating the Scenario 04:14
30 Attacking 06:16
31 Summary 01:46
32 Intro to DoS/DDoS the Target 03:09
33 Outline Objectives 00:56
34 Load up the Server 02:17
35 Look for Vulnerabilities & Flooding 01:34
36 Email-bombing & Flood Web-forms 01:50
37 Summary 02:42
38 Intro to Session Hijacking the Target 02:54
39 Steps to Test for Session Hijacking 05:31
40 Summary 01:42
41 Intro to Targeting Web Servers 03:26
42 Recon Your Targets 04:12
43 More In-depth Recon 03:56
44 Summary 01:51
45 Intro to Hitting the Web Apps 03:33
46 Define Targets & Gather Information 03:36
47 Configuration Management Testing 02:11
48 Authentication Testing 02:18
49 Session Management Testing 01:49
50 Authorization Testing 01:10
51 Data Validation Testing 03:47
52 Denial of Service Testing 02:24
53 Web Services Testing 03:32
54 AJAX Testing 02:19
55 Summary 03:21
56 Intro to Looking at the Wi-Fi 02:31
57 Who's Out There!? 01:26
58 WEP Testing 01:07
59 WPA/WPA2 Testing 02:09
60 General Wi-Fi Testing 02:08
61 Summary 01:54
62 Intro to Focusing on the Mobile Devices 03:16
63 Android Pen Testing 04:25
64 iPhone Pen Testing 03:26
65 Windows Phone Pen Testing 02:41
66 BlackBerry Pen Testing 04:16
67 Summary 01:56
68 Intro to Target the Firewall and/or IDS 02:34
69 Firewall Testing 04:03
70 IDS Testing 08:49
71 Summary 01:20
72 Intro to Going After the Cloud 02:10
73 It's Not All About You: Before You Begin 03:30
74 It's Not All About You: The Steps 06:36
75 Summary 01:29
76 Intro to How to Bring It All Together 01:52
77 What's in the Report? 08:02
78 Summary 02:00

Similar courses to Ethical Hacking: Penetration Testing

Sound Design with Cubase

Sound Design with Cubasedesigncode.io

Duration 1 hour 57 minutes 34 seconds
Computer Systems

Computer SystemsOz Nova (csprimer.com)

Duration 28 hours 15 minutes 48 seconds
Advanced Radix UI

Advanced Radix UIBuild UI

Duration 2 hours 13 minutes 5 seconds
Agile Business Analysis

Agile Business Analysisudemy

Duration 1 hour 35 minutes 36 seconds
AI Coding with GitHub Copilot

AI Coding with GitHub Copilotzerotomastery.io

Duration 1 hour 8 minutes 6 seconds
Refactoring UI - Complete Package

Refactoring UI - Complete Packageadamwathan

Duration 40 minutes 42 seconds