Security Penetration Testing Hacking Art Collection
This course is a complete guide to helping you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore the professional networking and security topics, including the introduction of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see the first hand how an ethical hacker performs the initial reconnaissance of a victim and how security and security are measured.
With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights on the methodologies used to evaluate and compromise a network. It covers the legal aspects of ethical hacking and associated risks. This course further reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post-exploitation techniques. You will also learn the art of social engineering, with a special coverage of tools such as the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you will take a look at the guidelines for how to write a penetration testing report,
This course provides supplemental material for the enhancement of some of the critical concepts and techniques that the reader has learned and provides practice questions to assess their understanding of the topics. This material can be found at theartofhacking.org.
While there are a variety of ethical hacking and cybersecurity certifications out there, this course is meant to introduce people to the ethical hacking and penetration testing concepts and is an agnostic certification.
– Lesson 1: Overview of Ethical Hacking and Penetration Testing
– Lesson 2: Kali Linux
– Lesson 3: Passive Reconnaissance
– Lesson 4: Active Reconnaissance
– Lesson 5: Hacking Web Applications
– Lesson 6: Hacking User Credentials
– Lesson 7; Hacking Databases
– Lesson 8: Hacking Networking Devices
– Lesson 9: Fundamentals of Wireless Hacking
– Lesson 10: Buffer Overflows
– Lesson 11: Powershell Attacks
– Lesson 12: Evasion and Post Exploitation Techniques
– Lesson 13: Social Engineering
– Lesson 14: Maintaining Persistence , Pivoting, and Data Exfiltration
– Lesson 15: Writing Penetration Testing Reports
Teacher: Chris McCoy, Ron Taylor, Jon Sternstein, Omar Santos
Level of training: Elementary, Secondary
: 4 hours + 30 minutes
File Size: 5680 MB