From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Conduct penetration tests
From the course: Performing a Technical Security Audit and Assessment
Conduct penetration tests
- [Instructor] Throughout this course, I've frequently mentioned penetration testing. Let's learn what it is and how it's used. Penetration testing involves validating vulnerabilities by attempting to exploit them and gain unauthorized access. Also known as pen tests or ethical hacking, these assessments build upon the information gathered during the discovery and vulnerability scanning phases. Penetration tests are crucial to security assessments because they validate existing weaknesses by simulating real-world attack scenarios. Typically, pen tests follow a four-stage methodology, gather data and planning, discovery and vulnerability analysis, attempt exploits, and reporting and remediation. The gather data and planning stage closely parallels the content covered in this course's "Technical Security Assessment Reviews" and "Planning Technical Security Assessments" chapters. in this stage, assessors determine the assessment scope, obtain proper permissions, and coordinate assessment…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Baseline skill sets for target vulnerability validation49s
-
(Locked)
Crack passwords1m 53s
-
Password cracking tool demo3m 23s
-
(Locked)
Challenge: Install and run a password cracker1m 3s
-
(Locked)
Solution: Install and run a password cracker2m 27s
-
(Locked)
Conduct penetration tests3m 3s
-
(Locked)
Penetration testing tool demo2m 46s
-
(Locked)
Conduct social engineering1m 15s
-
(Locked)
-
-
-
-