Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series): Creating Red Teams and Hacking the Enterprise

Pearson presents Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series): Creating Red Teams and Hacking the Enterprise.

Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series): Creating Red Teams and Hacking the Enterprise

Course Description

Enterprise Penetration Testing and Continuous Monitoring LiveLessons , part of The Art of Hacking video series, from Pearson provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessmen... Read More »

Enterprise Penetration Testing and Continuous Monitoring LiveLessons , part of The Art of Hacking video series, from Pearson provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities.

Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career or simply keeping up-to-date on evolving threats to keep your enterprise network secure from vulnerabilities.

Topics covered:

  • Introduction to enterprise penetration testing and continuous monitoring
  • External and internal reconnaissance
  • Enterprise social engineering
  • Network and vulnerability scanning
  • Web app testing
  • Internal testing
  • Privilege escalation
  • Enterprise secrets, post exploitation, and data exfiltration
  • Cloud services
  • Reporting and continuous evaluation

You will learn how to:

  • Plan, build, and run a Red Team to conduct enterprise hacking
  • Probe for enterprise vulnerabilities using passive/active reconnaissance, social engineering, network and vulnerability scanning
  • Target hosts and deploy tools to compromise web apps
  • Infiltrate the network, scan vulnerable targets and open-source software, and host a “capture-the-flag” event to identify enterprise vulnerabilities
  • Escalate network access privilege using proven methods and tools
  • Perform password cracking, compromise network and user credentials, exfiltrate sensitive data, and cover your tracks in the process
  • Test cloud services for vulnerabilities
  • Conduct reports for penetration testing events and set up a continuous monitoring infrastrucutre to mitigate ongoing threats
Read Less
Course Details:

Target Audience

  • Any network and security professional who is starting a career in ethical hacking and penetration testing
  • Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), and any other ethical hacking certification
  • Any cybersecurity professional who wants to learn the skills required to become a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts

Prerequisites

  • This course requires you to have basic knowledge of networking and cybersecurity concepts and technologies

Course Outline

  • Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Introduction
  • Learning objectives
  • 1.1 Introducing Red Teams and Enterprise Hacking
  • 1.2 Understanding Enterprise Wide Penetration Testing
  • 1.3 Understanding the Difference Between Red and Blue Teams
  • 1.4 Exploring How to Plan and Fund a Red Team
  • 1.5 Surveying Operational Processes and Policies for the Red Team
  • 1.6 Understanding How to Create and Hire the Red Team
  • 1.7 Understanding Red Team Collaboration
  • Learning objectives
  • 2.1 Understanding the Red Team Environment
  • 2.2 Understanding Passive Recon
  • 2.3 Understanding Active Recon
  • Learning objectives
  • 3.1 Surveying Social Engineering Methodologies
  • 3.2 Understanding How to Target Employees
  • 3.3 Exploiting Social Engineering Tools
  • Learning objectives
  • 4.1 Exploring Network and Vulnerability Scanning Methodologies
  • 4.2 Understanding the Operational Impact of Enterprise-wide Scanning
  • 4.3 Understanding Scanning Tools
  • 4.4 Exploring How to Automate Scans
  • 4.5 Using Shodan and Its API
  • 4.6 Exploring Vulnerability Scanners
  • 4.7 Understanding Binary and Source Code Scanners
  • 4.8 Understanding How to Perform Continuous Monitoring
  • Learning objectives
  • 5.1 Exploring How to Target Hosts
  • 5.2 Exploring Web App Testing Essential Tools
  • 5.3 Understanding Enterprise Application Continuous Testing
  • Learning objectives
  • 6.1 Understanding How to Initially Get on the Network
  • 6.2 Understanding What Hosts to Target and the Scope of the Testing
  • 6.3 Exploring the Hidden Cost of Open Source Software
  • 6.4 Learning How to Host Enterprise Capture the Flag Events
  • Learning objectives
  • 7.1 Learning Privilege Escalation Methodologies
  • 7.2 Understanding Lateral Movement
  • 7.3 Surveying Privilege Escalation Essential Tools
  • Learning objectives
  • 8.1 Understanding Persistent Access
  • 8.2 Learning How to Achieve Domain Admin Access
  • 8.3 Understanding How to Compromise User Credentials
  • 8.4 Surveying Password Cracking & Reporting
  • 8.5 Understanding That Domain Admin Is Not the End Goal
  • 8.6 Searching for Sensitive Data
  • 8.7 Understanding Data Exfiltration Techniques
  • 8.8 Understanding How to Cover Your Tracks
  • Learning objectives
  • 9.1 Understanding the Challenge of Testing Cloud Services
  • 9.2 Exploring How to Test in the Cloud
  • Learning objectives
  • 10.1 Surveying Final Reports for Transactional Penetration Testing Events
  • 10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring
  • Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Summary

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.