Ethical Hacking: Penetration Testing

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.
Course info
Rating
(37)
Level
Beginner
Updated
July 18, 2016
Duration
4h 43m
Table of contents
Understanding Penetration Testing
Pen Testing: Reconning and/or Footprinting the Target
Pen Testing: Scanning the Target
Pen Testing: Enumerating the Target
Pen Testing: Hacking the Target
Pen Testing: Sniffing the Target
Pen Testing: Social Engineering the Target
Pen Testing: DoS/DDoS the Target
Pen Testing: Session Hijacking the Target
Pen Testing: Targeting Web Servers
Pen Testing: Hitting Web Apps
Pen Testing: Looking at the Wi-Fi
Pen Testing: Focusing on the Mobile Devices
Pen Testing: Target the Firewall and/or IDS
Pen Testing: Going After the Cloud
How to Bring It All Together
Description
Course info
Rating
(37)
Level
Beginner
Updated
July 18, 2016
Duration
4h 43m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith