Description
01 – Security Penetration Testing Introduction 02 – 1.0 Learning objectives 03 – 1.1 Introducing Ethical Hacking and Pen Testing 04 – 1.2 Getting Started with Ethical Hacking and Pen Testing 05 – 1.3 Understanding the Legal Aspects of Penetration Testing 06 – 1.4 Exploring Penetration Testing Methodologies 07 – 1.5 Exploring Penetration Testing and other Cyber Security Certifications 08 – 1.6 Building Your Own Lab 09 – 1.7 Understanding Vulnerabilities, Threats, and Exploits 10 – 1.8 Understanding the Current Threat Landscape 11 – 2.0 Learning objectives 12 – 2.1 Installing Kali 13 – 2.2 Examining Kali Modules and Architecture 14 – 2.3 Managing Kali Services 15 – 3.0 Learning objectives 16 – 3.1 Understanding Passive Reconnaissance 17 – 3.2 Exploring Passive Reconnaissance Methodologies 18 – 3.3 Surveying Essential Tools for Passive Reconnaissance 19 – 4.0 Learning objectives 20 – 4.1 Understanding Active Reconnaissance 21 – 4.2 Exploring Active Reconnaissance Methodologies 22 – 4.3 Surveying Essential Tools for Active Reconnaissance 23 – 5.0 Learning objectives 24 – 5.1 Understanding Web Applications 25 – 5.2 Understanding Web Architectures 26 – 5.3 Uncovering Web Vulnerabilities 27 – 5.4 Exploring Methodologies for Testing Web Applications 28 – 5.5 Understanding the Exploitation of Web Applications 29 – 5.6 Surveying Defenses to Mitigate Web Application Hacking 30 – 6.0 Learning objectives 31 – 6.1 Understanding Authentication and Authorization Mechanisms 32 – 6.2 Understanding Authentication and Authorization Attacks 33 – 6.3 Exploring Password Storage Mechanisms 34 – 6.4 Attacking Password Storage 35 – 6.5 Exploring Password Cracking 36 – 7.0 Learning objectives 37 – 7.1 Reviewing Database Fundamentals 38 – 7.2 Attacking a Database 39 – 7.3 Surveying Defenses to Mitigate Database Hacking 40 – Security Penetration Testing Summary


Reviews
There are no reviews yet.