Course Library View the full range of courses
Accounting (92 courses)
Employability (850 courses)
Health and Social Care (129 courses)
IT & Software (100 courses)
Language (58 courses)
Management (346 courses)
Personal Development (1318 courses)
Teach & Education (99 courses)
Dive into the world of cloud technology and gain expertise in this dynamic field. Learn to manage cloud infrastructure, security, and more. Master the skills sought after by top employers, and open doors to exciting career opportunities. Enroll now and let your cloud journey begin!
Section 01: Introduction | |||
Introduction | 00:09:00 | ||
Section 02: Planning And Scoping | |||
Planning a Pen Test | 00:09:00 | ||
Rules of Engagement | 00:11:00 | ||
Resources and Budget | 00:07:00 | ||
Impact and Constraints | 00:05:00 | ||
Support Resources | 00:13:00 | ||
Legal Groundwork | 00:12:00 | ||
Scope Considerations | 00:11:00 | ||
Lab Environment Setup | 00:23:00 | ||
Project Strategy and Risk | 00:09:00 | ||
Scope Vulnerabilities | 00:14:00 | ||
Compliance-Based Assessments | 00:05:00 | ||
Section 03: Surveying The Target | |||
Scanning and Enumeration | 00:05:00 | ||
Scanning Demo | 00:11:00 | ||
Packet Investigation | 00:08:00 | ||
Packet Inspection Demo | 00:06:00 | ||
Application and Open-Source Resources | 00:12:00 | ||
Vulnerability Scanning | 00:09:00 | ||
Vulnerability Scanning Demo | 00:17:00 | ||
Target Considerations | 00:16:00 | ||
Nmap Timing and Performance Options | 00:07:00 | ||
Prioritization of Vulnerabilities | 00:09:00 | ||
Common Attack Techniques | 00:12:00 | ||
Credential Attacks | 00:15:00 | ||
Weaknesses in Specialized Systems | 00:18:00 | ||
Section 04: Select Your Attack Vector | |||
Remote Social Engineering | 00:07:00 | ||
Spear Phishing Demo | 00:10:00 | ||
In-Person Social Engineering | 00:12:00 | ||
Network-Based Exploits | 00:07:00 | ||
FTP Exploit Demo | 00:08:00 | ||
Man-in-the-middle Exploits | 00:07:00 | ||
Wireless Exploits | 00:14:00 | ||
Application Exploits, Part 1 | 00:06:00 | ||
SQL Injection Demo | 00:09:00 | ||
Application Exploits, Part 2 | 00:08:00 | ||
Application Exploits, Part 3 | 00:09:00 | ||
Code Vulnerabilities | 00:17:00 | ||
Local Host Vulnerabilities | 00:05:00 | ||
Privilege Escalation (Linux) | 00:10:00 | ||
Privilege Escalation (Windows) | 00:06:00 | ||
Misc. Privilege Escalation | 00:08:00 | ||
Misc. Local Host Vulnerabilities | 00:08:00 | ||
Physical Security | 00:11:00 | ||
Post-Exploitation Techniques | 00:11:00 | ||
Persistence and Stealth | 00:11:00 | ||
Section 05: Selecting Pen Testing Tools | |||
Nmap Scoping & Output Options | 00:21:00 | ||
Pen Testing Toolbox | 00:07:00 | ||
Using Kali Linux | 00:06:00 | ||
Scanners & Credential Tools | 00:10:00 | ||
Code-Cracking Tools | 00:05:00 | ||
Open-Source Research Tools | 00:07:00 | ||
Wireless and Web Pen Testing Tools | 00:11:00 | ||
Remote Access Tools | 00:06:00 | ||
Analyzers and Mobile Pen Testing Tools | 00:03:00 | ||
Other Pen Testing Tools | 00:05:00 | ||
Using Scripting in Pen Testing | 00:13:00 | ||
Bash Scripting Basics | 00:15:00 | ||
Bash Scripting Techniques | 00:10:00 | ||
PowerShell Scripts | 00:04:00 | ||
Ruby Scripts | 00:07:00 | ||
Python Scripts | 00:07:00 | ||
Scripting Languages Comparison | 00:11:00 | ||
Section 06: Reporting And Communication | |||
Writing Reports | 00:16:00 | ||
Post-Report Activities | 00:06:00 | ||
Mitigation Strategies | 00:05:00 | ||
Communication | 00:10:00 | ||
Order your Certificates & Transcripts | |||
Order your Certificates & Transcripts | 00:00:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.