Penetration Testing Unveiled Ethical Hacking Pentesting

Cyber Range | Penetration | Intrusion Analysis | Vulnerability Testing | Virtual Machines (VM) | Labs | Quizzes
Penetration Testing Unveiled Ethical Hacking Pentesting
File Size :
2.64 GB
Total length :
3h 7m

Category

Instructor

Starweaver Instructor Team

Language

Last update

1/2023

Ratings

4.5/5

Penetration Testing Unveiled Ethical Hacking Pentesting

What you’ll learn

Learn the motives and mindset of an attacker
Carry out the penetration testing methodology like a professional
Explore methods to attack devices and servers
Investigate the process of attacking the client side of the network
Explore penetration testing
Experience the process of identifying weaknesses and then attacking them
Learn techniques to penetrate perimeter devices
Explore the challenge of defeating enterprise defenses
Practice a multitude of evasion tactics
Perform penetration testing by using client side tactics
Compete against a live progressive target range
Enhance your professional security testing skills
Develop a roadmap to becoming a professional penetration tester

Penetration Testing Unveiled Ethical Hacking Pentesting

Requirements

Anyone who wants to explore the topic can enroll

Description

To effectively secure the networks of today requires the establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. In this course you learn how to conduct a pentest and what cybersecurity is all about.  You will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing.You will build the skills and apply techniques to penetrate devices, servers, and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skill sets increase.By the time you leave the course, you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once. Your instructor, Kevin Cardwell, is a former senior U.S. Navy cybersecurity expert and the author of multiple books on cybersecurity.More about this course and StarweaverThis course is led by a seasoned technology industry practitioner and executive, with many years of hands-on, in-the-trenches cybersecurity work. It has been designed, produced and delivered by Starweaver. Starweaver is one of the most highly regarded, well-established training providers in the world, providing training courses to many of the leading financial institutions and technology companies, including:Ahli United Bank; Mashreqbank; American Express; ANZ Bank; ATT; Banco Votorantim; Bank of America; Bank of America Global Markets; Bank of America Private Bank; Barclay Bank; BMO Financial Group; BMO Financial Services; BNP Paribas; Boeing; Cigna; Citibank; Cognizant; Commerzbank; Credit Lyonnais/Calyon; Electrosonic; Farm Credit Administration; Fifth Third Bank; GENPACT; GEP Software; GLG Group; Hartford; HCL; HCL; Helaba; HSBC; HSBC Corporate Bank; HSBC India; HSBC Private Bank; Legal & General; National Australia Bank; Nomura Securities; PNC Financial Services Group; Quintiles; RAK Bank; Regions Bank; Royal Bank of Canada; Royal Bank of Scotland; Santander Corporate Bank; Tata Consultancy Services; Union Bank; ValueMomentum; Wells Fargo; Wells Fargo India Solutions; Westpac Corporate Bank; Wipro; and, many others.Starweaver has and continues to deliver 1000s of live in-person and online education for organizational training programs for new hires and induction, as well as mid-career and senior-level immersion and leadership courses.If you are looking for live streaming education or want to understand what courses might be best for you in technology or business, just google:Starweaver journey builder starweaver[dot]comHappy learning.

Overview

Section 1: Module One

Lecture 1 Welcome!

Lecture 2 Building the Cyber Range

Lecture 3 Multiple Layers and Switches

Lecture 4 Customizing IP Addresses

Lecture 5 Finding and Building Your Own Machine

Lecture 6 Building and Advanced Range

Section 2: Module Two

Lecture 7 The Process of Penetration Testing

Section 3: Module Three

Lecture 8 The Abstract Methodology

Lecture 9 Planning

Lecture 10 Intrusive Target Search and Scanning Methodology

Lecture 11 Network Mapping and Nmap

Lecture 12 Understanding Open Ports

Lecture 13 Services Running on Ports

Lecture 14 Enumeration

Section 4: Module Four

Lecture 15 Identification of Vulnerabilities Manual

Lecture 16 Identification of Vulnerabilities Manual Dups

Lecture 17 Openvas

Section 5: Module Five

Lecture 18 Validation of Vulnerabilities

Lecture 19 Exploit Tools and Distributions

Section 6: Module Six

Lecture 20 Data Analysis Review

Lecture 21 Reporting and Showcasing Results

Section 7: Labs Module One

Lecture 22 Lab 01 – Part 01 Setting Up a Flat Network

Lecture 23 Lab 01 – Part 02 – Understanding Virtual Box

Lecture 24 Lab 01 – Part 03 – VM Workstation Player

Lecture 25 Lab 02 – Part 01 – Setting Up Multiple Layer

Lecture 26 Lab 02 – Part 02 – Virtual Box

Lecture 27 Lab 02 – Part 03 – VMware Player Methods

Lecture 28 Lab 03 – Customizing Your IP Addresses

Lecture 29 Lab 04 – Building Your Own Machine Kioptrix

Lecture 30 Lab 05 – Setting Up The Advanced Range

Section 8: Labs Module Two

Lecture 31 Lab 01 – Instrusive Target Search

Lecture 32 Lab 02 – Scanning Live Systems

Lecture 33 Lab 03 – Ports

Lecture 34 Lab 04 – Services Scan

Lecture 35 Lab 05 – Enumeration

Section 9: Labs Module Three

Lecture 36 Lab 01 – Vulnerability Sites

Lecture 37 Lab 02 – Using Nmap

Lecture 38 Lab 03 – Exploring Openvas

Lecture 39 Lab 04 – Exploring Nessus

Lecture 40 Lab 05 – Exploring Nikto

Section 10: Labs Module Four

Lecture 41 Lab 01 – Exploitdb

Lecture 42 Lab 02 – Exploitdb Dups

Lecture 43 Lab 03 – Tcpdump Data Analysis

Section 11: Closing Remarks

Lecture 44 Take-aways

Everyone

Course Information:

Udemy | English | 3h 7m | 2.64 GB
Created by: Starweaver Instructor Team

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top