Security Penetration Testing (The Art of Hacking Series)

Pearson presents Security Penetration Testing (The Art of Hacking Series).

Security Penetration Testing (The Art of Hacking Series)

Course Description

This course from Pearson is a complete guide to help you get up and running with your cyber security career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies u... Read More »

This course from Pearson is a complete guide to help you get up and running with your cyber security career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture.

With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. Also covered are numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, and Maltego. You’ll find guidelines on how to write penetration testing reports, and learn how to plan and organize the them.

This course provides supplemental material to reinforce some of the critical concepts and techniques learned, scripts to help you build your own hacking environment, and examples of real-life penetration testing reports. The material for this course can be accessed here.

While there are a variety of ethical hacking and cyber security certifications out there, this course is meant to introduce people to the concepts behind ethical hacking and penetration testing and is certification agnostic.

You will learn:

  • This course will provide step-by-step guidance about ethical hacking, penetration testing, and security posture assessment.
  • Provides an easy to use and cost effective means to learn the various concepts associated with many different leading-edge offensive security skills in the industry.
  • Provides multimedia tutorials that users can apply to real world scenarios.
Read Less
Course Details:

Target Audience

  • This course serves as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification.

  • This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

Prerequisites

  • This course requires you to have basic knowledge of the internet and networking technology
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • Security Penetration Testing (The Art of Hacking Series)
  • 1.0 Learning objectives
  • 1.1 Introducing Ethical Hacking and Pen Testing
  • 1.2 Getting Started with Ethical Hacking and Pen testing
  • 1.3 Understanding the Legal Aspects of Penetration Testing
  • 1.4 Exploring Penetration Testing Methodologies
  • 1.5 Exploring Penetration Testing and other Cyber Security Certifications
  • 1.6 Building Your Own Lab Overview
  • 1.7 Building Your Own Lab: VIRL and Operating System Software
  • 1.8 Understanding Vulnerabilities, Threats, and Exploits
  • 1.9 Understanding the Current Threat Landscape
  • 2.0 Learning objectives
  • 2.1 Installing Kali
  • 2.2 Examining Kali Modules and Architecture
  • 2.3 Managing Kali Services
  • 3.0 Learning objectives
  • 3.1 Understanding Passive Reconnaissance
  • 3.2 Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information
  • 3.3 Exploring Passive Reconnaissance Methodologies: Searching for Files
  • 3.4 Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information
  • 3.5 Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover
  • 3.6 Surveying Essential Tools for Passive Reconnaissance: Recon-ng
  • 4.0 Learning objectives
  • 4.1 Understanding Active Reconnaissance
  • 4.2 Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective
  • 4.3 Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review
  • 4.4 Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners
  • 5.0 Learning objectives
  • 5.1 Understanding Web Applications
  • 5.2 Understanding Web Architectures
  • 5.3 Uncovering Web Vulnerabilities
  • 5.4 Testing Web Application Methodologies
  • 5.5 Testing Web Applications: Reconnaissance
  • 5.6 Testing Web Applications: Mapping
  • 5.7 Testing Web Applications: Vulnerability Discovery
  • 5.8 Understanding the Exploitation of Web Applications
  • 5.9 Surveying Defenses to Mitigate Web Application Hacking
  • 6.0 Learning objectives
  • 6.1 Understanding Authentication and Authorization Mechanisms
  • 6.2 Understanding Authentication and Authorization Attacks
  • 6.3 Exploring Password Mechanisms
  • 6.4 Understanding Password Storage Vulnerability
  • 6.5 Cracking Passwords with John the Ripper
  • 6.6 Cracking Passwords with hashcat
  • 6.7 Improving Password Security
  • 7.0 Learning objectives
  • 7.1 Reviewing Database Fundamentals
  • 7.2 Attacking a Database: Discovery, Validation, and Exploitation
  • 7.3 Attacking a Database: Automated Scanners
  • 7.4 Surveying Defesnes to Mitigate Database Hacking
  • 8.0 Learning objectives
  • 8.1 Understanding the Reasons for and the Steps to Hacking a Network
  • 8.2 Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models
  • 8.3 Reviewing Networking Technology Fundamentals: Fowarding Device Architecture and Communication
  • 8.4 Building an Internet work Topology Using VIRL
  • 8.5 Hacking Switches: Reviewing Ethernet Fundamentals
  • 8.6 Hacking Switches: Demo
  • 8.7 Hacking Switches: App Vulnerabilities and ARP Cache Posioning
  • 8.8 Reviewing Router Fundamentals
  • 8.9 Examining ICMP, First Hop Redundancy and Routing Protocol Attacks
  • 8.10 Hacking the Management Plane
  • 8.11 Understanding Firewall Fundamentals and Levels of Inspection
  • 8.12 Performing Firewall Reconnaissance and Tunneling
  • 8.13 Surveying Essential Tools for Hacking Network Devices: Packet Capture
  • 8.14 Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools
  • 8.15 Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools
  • 8.16 Surveying Essential Tools for Hacking Network Devices: MiTM Tools
  • 8.17 Surveying Essential Tools for Hacking Network Devices: Linux Tools
  • 8.18 Using Network Device Hacking Tools to Perform a MiTM attack
  • 9.0 Learning objectives
  • 9.1 Reviewing Wireless Technology Fundamentals
  • 9.2 Surveying Wireless Hacking Tools: Wireless Adaptors
  • 9.3 Surveying Wireless Hacking Tools: Software
  • 9.4 Hacking WEP, WPA, and Other Protocols
  • 9.5 Understanding Hacking Wireless Clients
  • 10.0 Learning objectives
  • 10.1 Understanding Buffer Overflows
  • 10.2 Exploiting Buffer Overflows
  • 10.3 Overcoming Defenses for Buffer Overflow Vulnerabilities
  • 10.4 Understanding Fuzzing
  • 10.5 Creating a Fuzzing Strategy
  • 10.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers
  • 10.7 Surveying Tools to Find and Exploit Buffer Overflows
  • 11.0 Learning objectives
  • 11.1 Understanding Powershell
  • 11.2 Pwning Windows Using PowerShell: Empire Components, Setup, and Basic Exploits
  • 11.3 Pwning Windows Using PowerShell: Empire Modules and Advanced Exploits
  • 11.4 Gathering Network Information Using PowerShell
  • 12.0 Learning objectives
  • 12.1 Understanding Security Evasion Techniques
  • 12.2 Exploring Post Exploitation Techniques
  • 12.3 Covering Your Tracks
  • 13.0 Learning objectives
  • 13.1 Understanding Social Engineering
  • 13.2 Exploring the Social Engineering Toolkit (SET)
  • 13.3 Exploring Maltego
  • 13.4 Surveying Social Engineering Case Studies
  • 14.0 Learning objectives
  • 14.1 Understanding Persistence
  • 14.2 Gaining Network Access
  • 14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS, Name Services and LLMNR Poisoning
  • 14.4 Maintaining Persistence
  • 14.5 Understanding Pivoting and Lateral Movement
  • 14.6 Defending Against the Advanced Persistent Threat
  • 15.0 Learning objectives
  • 15.1 Understanding Pen Test Reports and How They Are Used
  • 15.2 Planning and Organizing Your Report
  • 15.3 Understanding the Pen Test Report Format
  • 15.4 Exploring Risk Ratings
  • 15.5 Distributing Pen Test Reports
  • Security Penetration Testing The Art of Hacking Series LiveLessons:Summary

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.