Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid
October 31, 2024

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

More

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online Ethical Hacking: Penetration Testing

Join premium to watch
Go to premium
# Title Duration
1 Understanding Penetration Testing 04:08
2 Why Do Penetration Tests? 08:26
3 Types of Pen Tests 04:01
4 Stage 1: Pre-attack 16:04
5 Stage 2: Attack 06:38
6 Stage 3: Post-attack 01:46
7 Pen Testing Standards 16:50
8 Summary 03:11
9 Laying the Foundation 01:20
10 The Steps to a Successful Pen Test 06:19
11 Summary 00:52
12 Intro to Scanning the Target 01:58
13 Steps to Scan the Target 06:05
14 Summary 00:51
15 Intro to Enumerating the Target 01:47
16 Steps to Enumerate the Target 07:24
17 Summary 05:12
18 Intro to Hacking the Target 03:18
19 Password Cracking 10:06
20 Privilege Escalation 02:14
21 Service Accounts 02:09
22 Hide & Seek Time 03:33
23 Covering Our Tracks 01:32
24 Summary 02:28
25 Intro to Sniffing the Target 01:50
26 Flooding, Spoofing, & Poisoning 05:31
27 Summary 01:57
28 Intro to Social Engineering 04:33
29 Reconnaissance & Creating the Scenario 04:14
30 Attacking 06:16
31 Summary 01:46
32 Intro to DoS/DDoS the Target 03:09
33 Outline Objectives 00:56
34 Load up the Server 02:17
35 Look for Vulnerabilities & Flooding 01:34
36 Email-bombing & Flood Web-forms 01:50
37 Summary 02:42
38 Intro to Session Hijacking the Target 02:54
39 Steps to Test for Session Hijacking 05:31
40 Summary 01:42
41 Intro to Targeting Web Servers 03:26
42 Recon Your Targets 04:12
43 More In-depth Recon 03:56
44 Summary 01:51
45 Intro to Hitting the Web Apps 03:33
46 Define Targets & Gather Information 03:36
47 Configuration Management Testing 02:11
48 Authentication Testing 02:18
49 Session Management Testing 01:49
50 Authorization Testing 01:10
51 Data Validation Testing 03:47
52 Denial of Service Testing 02:24
53 Web Services Testing 03:32
54 AJAX Testing 02:19
55 Summary 03:21
56 Intro to Looking at the Wi-Fi 02:31
57 Who's Out There!? 01:26
58 WEP Testing 01:07
59 WPA/WPA2 Testing 02:09
60 General Wi-Fi Testing 02:08
61 Summary 01:54
62 Intro to Focusing on the Mobile Devices 03:16
63 Android Pen Testing 04:25
64 iPhone Pen Testing 03:26
65 Windows Phone Pen Testing 02:41
66 BlackBerry Pen Testing 04:16
67 Summary 01:56
68 Intro to Target the Firewall and/or IDS 02:34
69 Firewall Testing 04:03
70 IDS Testing 08:49
71 Summary 01:20
72 Intro to Going After the Cloud 02:10
73 It's Not All About You: Before You Begin 03:30
74 It's Not All About You: The Steps 06:36
75 Summary 01:29
76 Intro to How to Bring It All Together 01:52
77 What's in the Report? 08:02
78 Summary 02:00

Similar courses to Ethical Hacking: Penetration Testing

Design Microservices Architecture with Patterns & Principles

Design Microservices Architecture with Patterns & Principles

Duration 17 hours 26 minutes 52 seconds
System Design Course

System Design Course

Duration 92 hours 26 minutes 21 seconds
The Power of Thought Experiments

The Power of Thought Experiments

Duration 11 hours 54 minutes 19 seconds
Object-Oriented Programming

Object-Oriented Programming

Duration 4 hours 36 minutes 7 seconds
Mind-Blowing Science: Season 2

Mind-Blowing Science: Season 2

Duration 4 hours 30 seconds