Skip to main content

Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid

Course description

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

Read more about the course

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 78 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Understanding Penetration Testing

All Course Lessons (78)

#Lesson TitleDurationAccess
1
Understanding Penetration Testing Demo
04:08
2
Why Do Penetration Tests?
08:26
3
Types of Pen Tests
04:01
4
Stage 1: Pre-attack
16:04
5
Stage 2: Attack
06:38
6
Stage 3: Post-attack
01:46
7
Pen Testing Standards
16:50
8
Summary
03:11
9
Laying the Foundation
01:20
10
The Steps to a Successful Pen Test
06:19
11
Summary
00:52
12
Intro to Scanning the Target
01:58
13
Steps to Scan the Target
06:05
14
Summary
00:51
15
Intro to Enumerating the Target
01:47
16
Steps to Enumerate the Target
07:24
17
Summary
05:12
18
Intro to Hacking the Target
03:18
19
Password Cracking
10:06
20
Privilege Escalation
02:14
21
Service Accounts
02:09
22
Hide & Seek Time
03:33
23
Covering Our Tracks
01:32
24
Summary
02:28
25
Intro to Sniffing the Target
01:50
26
Flooding, Spoofing, & Poisoning
05:31
27
Summary
01:57
28
Intro to Social Engineering
04:33
29
Reconnaissance & Creating the Scenario
04:14
30
Attacking
06:16
31
Summary
01:46
32
Intro to DoS/DDoS the Target
03:09
33
Outline Objectives
00:56
34
Load up the Server
02:17
35
Look for Vulnerabilities & Flooding
01:34
36
Email-bombing & Flood Web-forms
01:50
37
Summary
02:42
38
Intro to Session Hijacking the Target
02:54
39
Steps to Test for Session Hijacking
05:31
40
Summary
01:42
41
Intro to Targeting Web Servers
03:26
42
Recon Your Targets
04:12
43
More In-depth Recon
03:56
44
Summary
01:51
45
Intro to Hitting the Web Apps
03:33
46
Define Targets & Gather Information
03:36
47
Configuration Management Testing
02:11
48
Authentication Testing
02:18
49
Session Management Testing
01:49
50
Authorization Testing
01:10
51
Data Validation Testing
03:47
52
Denial of Service Testing
02:24
53
Web Services Testing
03:32
54
AJAX Testing
02:19
55
Summary
03:21
56
Intro to Looking at the Wi-Fi
02:31
57
Who's Out There!?
01:26
58
WEP Testing
01:07
59
WPA/WPA2 Testing
02:09
60
General Wi-Fi Testing
02:08
61
Summary
01:54
62
Intro to Focusing on the Mobile Devices
03:16
63
Android Pen Testing
04:25
64
iPhone Pen Testing
03:26
65
Windows Phone Pen Testing
02:41
66
BlackBerry Pen Testing
04:16
67
Summary
01:56
68
Intro to Target the Firewall and/or IDS
02:34
69
Firewall Testing
04:03
70
IDS Testing
08:49
71
Summary
01:20
72
Intro to Going After the Cloud
02:10
73
It's Not All About You: Before You Begin
03:30
74
It's Not All About You: The Steps
06:36
75
Summary
01:29
76
Intro to How to Bring It All Together
01:52
77
What's in the Report?
08:02
78
Summary
02:00

Unlock unlimited learning

Get instant access to all 77 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Great Thinkers, Great Theorems

Great Thinkers, Great Theorems

Sources: Wondrium by The Great Courses, Dr. William Dunham
Delve into the mechanics of some of math's greatest and most awe-inspiring achievements. Explore the most awe-inspiring theorems in the 3,000-year history of ma
12 hours 14 minutes 35 seconds
The Networking Bootcamp (CompTIA Network+ Certification)

The Networking Bootcamp (CompTIA Network+ Certification)

Sources: zerotomastery.io
Go from complete beginner to passing the CompTIA Network+ certification exam. You'll learn networking fundamentals, the latest best practices, and everything...
8 hours 39 minutes 57 seconds
Production-Ready Serverless

Production-Ready Serverless

Sources: Yan Cui
The Production-Ready Serverless course teaches how to build resilient and scalable serverless applications, ready for production deployment. It covers...
13 hours 37 minutes 6 seconds
Recorded Live Business Calls

Recorded Live Business Calls

Sources: Prodigies University
Unveil the secrets and strategies of successful SAAS business owners and entrepreneurs. Learn how they build, develop, and scale their companies, as well as...
31 hours 36 minutes 15 seconds