HOME > IT & Software > Penetration Testing Unveiled- Ethical Hacking Pentesting

Penetration Testing Unveiled- Ethical Hacking Pentesting

SynopsisPenetration Testing Unveiled: Ethical Hacking & Pentestin...
Penetration Testing Unveiled- Ethical Hacking Pentesting  No.1

Penetration Testing Unveiled: Ethical Hacking & Pentesting, available at $54.99, has an average rating of 4.55, with 44 lectures, 6 quizzes, based on 148 reviews, and has 35216 subscribers.

You will learn about Learn the motives and mindset of an attacker Carry out the penetration testing methodology like a professional Explore methods to attack devices and servers Investigate the process of attacking the client side of the network Explore penetration testing Experience the process of identifying weaknesses and then attacking them Learn techniques to penetrate perimeter devices Explore the challenge of defeating enterprise defenses Practice a multitude of evasion tactics Perform penetration testing by using client side tactics Compete against a live progressive target range Enhance your professional security testing skills Develop a roadmap to becoming a professional penetration tester This course is ideal for individuals who are Everyone It is particularly useful for Everyone.

Enroll now: Penetration Testing Unveiled: Ethical Hacking & Pentesting

Summary

Title: Penetration Testing Unveiled: Ethical Hacking & Pentesting

Price: $54.99

Average Rating: 4.55

Number of Lectures: 44

Number of Quizzes: 6

Number of Published Lectures: 44

Number of Published Quizzes: 6

Number of Curriculum Items: 50

Number of Published Curriculum Objects: 50

Original Price: $64.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn the motives and mindset of an attacker
  • Carry out the penetration testing methodology like a professional
  • Explore methods to attack devices and servers
  • Investigate the process of attacking the client side of the network
  • Explore penetration testing
  • Experience the process of identifying weaknesses and then attacking them
  • Learn techniques to penetrate perimeter devices
  • Explore the challenge of defeating enterprise defenses
  • Practice a multitude of evasion tactics
  • Perform penetration testing by using client side tactics
  • Compete against a live progressive target range
  • Enhance your professional security testing skills
  • Develop a roadmap to becoming a professional penetration tester
  • Who Should Attend

  • Everyone
  • Target Audiences

  • Everyone
  • To effectively secure the networks of today requires the establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.

    In this course you learn how to conduct a pentest and what cybersecurity is all about. You will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing.

    You will build the skills and apply techniques to penetrate devices, servers, and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skill sets increase.

    By the time you leave the course, you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once.

    Your instructor, Kevin Cardwell, is a former senior U.S. Navy cybersecurity expert and the author of multiple books on cybersecurity.

    More about this course and Starweaver

    This course is led by a seasoned technology industry practitioner and executive, with many years of hands-on, in-the-trenches cybersecurity work. It has been designed, produced and delivered by Starweaver. Starweaver is one of the most highly regarded, well-established training providers in the world, providing training courses to many of the leading financial institutions and technology companies, including:

    Ahli United Bank; Mashreqbank; American Express; ANZ Bank; ATT; Banco Votorantim; Bank of America; Bank of America Global Markets; Bank of America Private Bank; Barclay Bank; BMO Financial Group; BMO Financial Services; BNP Paribas; Boeing; Cigna; Citibank; Cognizant; Commerzbank; Credit Lyonnais/Calyon; Electrosonic; Farm Credit Administration; Fifth Third Bank; GENPACT; GEP Software; GLG Group; Hartford; HCL; HCL; Helaba; HSBC; HSBC Corporate Bank; HSBC India; HSBC Private Bank; Legal & General; National Australia Bank; Nomura Securities; PNC Financial Services Group; Quintiles; RAK Bank; Regions Bank; Royal Bank of Canada; Royal Bank of Scotland; Santander Corporate Bank; Tata Consultancy Services; Union Bank; ValueMomentum; Wells Fargo; Wells Fargo India Solutions; Westpac Corporate Bank; Wipro; and, many others.

    Starweaver has and continues to deliver 1000s of live in-person and online education for organizational training programs for new hires and induction, as well as mid-career and senior-level immersion and leadership courses.

    If you are looking for live streaming education or want to understand what courses might be best for you in technology or business, just google:

    Starweaver journey builder starweaver[dot]com

    Happy learning.

    Course Curriculum

    Chapter 1: Module One

    Lecture 1: Welcome!

    Lecture 2: Building the Cyber Range

    Lecture 3: Multiple Layers and Switches

    Lecture 4: Customizing IP Addresses

    Lecture 5: Finding and Building Your Own Machine

    Lecture 6: Building and Advanced Range

    Chapter 2: Module Two

    Lecture 1: The Process of Penetration Testing

    Chapter 3: Module Three

    Lecture 1: The Abstract Methodology

    Lecture 2: Planning

    Lecture 3: Intrusive Target Search and Scanning Methodology

    Lecture 4: Network Mapping and Nmap

    Lecture 5: Understanding Open Ports

    Lecture 6: Services Running on Ports

    Lecture 7: Enumeration

    Chapter 4: Module Four

    Lecture 1: Identification of Vulnerabilities Manual

    Lecture 2: Identification of Vulnerabilities Manual Dups

    Lecture 3: Openvas

    Chapter 5: Module Five

    Lecture 1: Validation of Vulnerabilities

    Lecture 2: Exploit Tools and Distributions

    Chapter 6: Module Six

    Lecture 1: Data Analysis Review

    Lecture 2: Reporting and Showcasing Results

    Chapter 7: Labs Module One

    Lecture 1: Lab 01 – Part 01 Setting Up a Flat Network

    Lecture 2: Lab 01 – Part 02 – Understanding Virtual Box

    Lecture 3: Lab 01 – Part 03 – VM Workstation Player

    Lecture 4: Lab 02 – Part 01 – Setting Up Multiple Layer

    Lecture 5: Lab 02 – Part 02 – Virtual Box

    Lecture 6: Lab 02 – Part 03 – VMware Player Methods

    Lecture 7: Lab 03 – Customizing Your IP Addresses

    Lecture 8: Lab 04 – Building Your Own Machine Kioptrix

    Lecture 9: Lab 05 – Setting Up The Advanced Range

    Chapter 8: Labs Module Two

    Lecture 1: Lab 01 – Instrusive Target Search

    Lecture 2: Lab 02 – Scanning Live Systems

    Lecture 3: Lab 03 – Ports

    Lecture 4: Lab 04 – Services Scan

    Lecture 5: Lab 05 – Enumeration

    Chapter 9: Labs Module Three

    Lecture 1: Lab 01 – Vulnerability Sites

    Lecture 2: Lab 02 – Using Nmap

    Lecture 3: Lab 03 – Exploring Openvas

    Lecture 4: Lab 04 – Exploring Nessus

    Lecture 5: Lab 05 – Exploring Nikto

    Chapter 10: Labs Module Four

    Lecture 1: Lab 01 – Exploitdb

    Lecture 2: Lab 02 – Exploitdb Dups

    Lecture 3: Lab 03 – Tcpdump Data Analysis

    Chapter 11: Closing Remarks

    Lecture 1: Take-aways

    Instructors

  • Penetration Testing Unveiled- Ethical Hacking Pentesting  No.2
    Starweaver Instructor Team
    Learning | Doing | Connecting?
  • Penetration Testing Unveiled- Ethical Hacking Pentesting  No.3
    Kevin Cardwell
    Computer Security Architect
  • Penetration Testing Unveiled- Ethical Hacking Pentesting  No.4
    Paul Siegel
    Top rated instructor and course creator
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 3 votes
  • 3 stars: 16 votes
  • 4 stars: 47 votes
  • 5 stars: 82 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!