Ethical Hacking: Penetration Testing

4h 43m 59s
English
Paid

Course description

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. 

Read more about the course

The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 78 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing

Watch Online Ethical Hacking: Penetration Testing

0:00
/
#1: Understanding Penetration Testing

All Course Lessons (78)

#Lesson TitleDurationAccess
1
Understanding Penetration Testing Demo
04:08
2
Why Do Penetration Tests?
08:26
3
Types of Pen Tests
04:01
4
Stage 1: Pre-attack
16:04
5
Stage 2: Attack
06:38
6
Stage 3: Post-attack
01:46
7
Pen Testing Standards
16:50
8
Summary
03:11
9
Laying the Foundation
01:20
10
The Steps to a Successful Pen Test
06:19
11
Summary
00:52
12
Intro to Scanning the Target
01:58
13
Steps to Scan the Target
06:05
14
Summary
00:51
15
Intro to Enumerating the Target
01:47
16
Steps to Enumerate the Target
07:24
17
Summary
05:12
18
Intro to Hacking the Target
03:18
19
Password Cracking
10:06
20
Privilege Escalation
02:14
21
Service Accounts
02:09
22
Hide & Seek Time
03:33
23
Covering Our Tracks
01:32
24
Summary
02:28
25
Intro to Sniffing the Target
01:50
26
Flooding, Spoofing, & Poisoning
05:31
27
Summary
01:57
28
Intro to Social Engineering
04:33
29
Reconnaissance & Creating the Scenario
04:14
30
Attacking
06:16
31
Summary
01:46
32
Intro to DoS/DDoS the Target
03:09
33
Outline Objectives
00:56
34
Load up the Server
02:17
35
Look for Vulnerabilities & Flooding
01:34
36
Email-bombing & Flood Web-forms
01:50
37
Summary
02:42
38
Intro to Session Hijacking the Target
02:54
39
Steps to Test for Session Hijacking
05:31
40
Summary
01:42
41
Intro to Targeting Web Servers
03:26
42
Recon Your Targets
04:12
43
More In-depth Recon
03:56
44
Summary
01:51
45
Intro to Hitting the Web Apps
03:33
46
Define Targets & Gather Information
03:36
47
Configuration Management Testing
02:11
48
Authentication Testing
02:18
49
Session Management Testing
01:49
50
Authorization Testing
01:10
51
Data Validation Testing
03:47
52
Denial of Service Testing
02:24
53
Web Services Testing
03:32
54
AJAX Testing
02:19
55
Summary
03:21
56
Intro to Looking at the Wi-Fi
02:31
57
Who's Out There!?
01:26
58
WEP Testing
01:07
59
WPA/WPA2 Testing
02:09
60
General Wi-Fi Testing
02:08
61
Summary
01:54
62
Intro to Focusing on the Mobile Devices
03:16
63
Android Pen Testing
04:25
64
iPhone Pen Testing
03:26
65
Windows Phone Pen Testing
02:41
66
BlackBerry Pen Testing
04:16
67
Summary
01:56
68
Intro to Target the Firewall and/or IDS
02:34
69
Firewall Testing
04:03
70
IDS Testing
08:49
71
Summary
01:20
72
Intro to Going After the Cloud
02:10
73
It's Not All About You: Before You Begin
03:30
74
It's Not All About You: The Steps
06:36
75
Summary
01:29
76
Intro to How to Bring It All Together
01:52
77
What's in the Report?
08:02
78
Summary
02:00

Unlock unlimited learning

Get instant access to all 77 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Advanced SAAS Sales Course

Advanced SAAS Sales Course

Sources: Prodigies University
A sales system for high-quality products for your SAAS project or business. Learn how to effectively sell expensive products and services using...
1 hour 31 minutes 8 seconds
Building an Interpreter from scratch

Building an Interpreter from scratch

Sources: udemy, Dmitry Soshnikov
How programming languages work under the hood? What’s the difference between compiler and interpreter? What is a virtual machine, and JIT-compiler? And what abo
2 hours 59 minutes 53 seconds
The Power of Thought Experiments

The Power of Thought Experiments

Sources: Wondrium by The Great Courses, Daniel Breyer
Thought experiments have been used throughout history by great thinkers to expand our knowledge of ourselves and the world. In this course, you’ll explore fasci
11 hours 54 minutes 19 seconds
Fundamentals of Operating Systems

Fundamentals of Operating Systems

Sources: udemy
Operating systems orchestrate many processes, allow access to memory, disk and network and execute the process by scheduling them to the CPU. Sounds simple...
21 hours 41 minutes 1 second
The SaaS Launchpad

The SaaS Launchpad

Sources: Rob Walling
The SaaS Launchpad - everything you need for a successful launch of your SaaS project. This course is a step-by-step guide from entrepreneur, author, and...
9 hours 59 minutes 36 seconds