Jump to content
QuoVadis

(video) Advanced Penetration Testing for Highly-Secured Environments

Recommended Posts

Disclaimer: nu e chiar "advanced', e mai mult beginners-medium, insa din motive de "marketing".. peste tot e "advanced". Destul de util insa, nonetheless. Also on Udemy.

Free download: aHR0cDovL21hYi50by9TdWpOMkpuZ3U=

Advanced Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the overwhelming threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.

The goal of the Advanced Penetration Testing for Highly-Secured Environments video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more.

To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.

If you are looking to advance in the IT security field, through advanced exploitation techniques and strategies, then this video course is for you.

[h=2]Who this course is for[/h] The Advanced Penetration Testing for Highly-Secured Environments video course is aimed at both newcomers and experienced professionals who wish to gain hands-on experience of advanced penetration testing. You will need elemental IT skills and concepts, knowledge of common network protocols such as TCP/IP, and a basic understanding of penetration testing.

[h=2]What you will learn from this course[/h]

  • Learn information gathering/Footprinting techniques and enumeration techniques
  • See how to gain both physical and remote access to secured systems
  • Navigate through the command prompt and Linux terminal along with the Backtrack 5 R3 Linux operating system
  • Understand the Metasploit Framework, Social-Engineering Toolkit, Nmap, Zenmap, and more
  • Learn how to deal with client-side exploitation attacks and advanced techniques to bypass firewalls, IDS, and IPS systems
  • Create a virtual penetration testing lab
  • Discover the usage of all the security tools
  • Generate a full, detailed penetration testing report

[h=2]Table of Contents[/h]

  1. Introduction to Advanced Penetration Testing
    • What Is Advanced Penetration Testing?
    • Installing VirtualBox
    • Installing BackTrack 5 R3
    • Installing Metasploitable
    • Set up BackTrack 5 R3

[*]Advanced Footprinting

  • What Is Footprinting?
  • Using Nslookup and Dig
  • Using Tracert and Traceroute
  • Using Paterva Maltego
  • Google Dorks and Social Engineering

[*]Enumeration: Getting to Know Your Target

  • What Is Enumeration?
  • Using Nmap and Zenmap
  • Using SNMPenu and SNMPwalk
  • Banner Grabbing with Netcat
  • Searching for Exploits

[*]Exploitation Applications: Getting to Know Your Tools

  • What Is Exploitation?
  • Installing the Nessus Vulnerability Scanner
  • Using the Nessus Vulnerability Scanner-Part 1
  • Installing and Updating the Metasploit Framework
  • Using the Metasploit Framework

[*]Gaining Physical Access

  • How Do Hackers Break into a Local System?
  • Breaking into Windows 7-Part 1
  • Breaking into Windows 7-Part 2
  • Breaking into Windows 7-Part 3
  • Breaking into Windows 7-Part 4

[*]Exploiting a Client-side Target

  • How Do Hackers Break into a Remote System?
  • Using the Social Engineering Toolkit
  • Using the Nessus Vulnerability Scanner-Part 2
  • Exploiting Windows 7
  • Exploiting Metasploitable

[*]Bypassing Web Filters, Firewalls, and IDS

  • Evading Web Filters, Firewalls, and IDSes
  • Bypassing Web Filters-Part 1
  • Bypassing Web Filters-Part 2
  • Stealth Scanning-Part 1
  • Stealth Scanning-Part 2

[*]Writing a Penetration Testing Report

  • Why Is It So Important to Write a Report?
  • What Should Be In the Report?
  • Writing a Report
  • Turning In the Report

  • Upvote 2
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...