Advanced Pen Testing Techniques

IT Security    |    Expert
  • 14 videos | 1h 22m 6s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 20 users Rating 4.3 of 20 users (20)
Explore advanced penetration testing tools and techniques used to find vulnerabilities, sniff network traffic, deal with cryptography, and crack passwords in this 14-video course. Learners will discover common techniques used to find weaknesses in both Linux and Windows-based systems. Key concepts covered here include finding vulnerability by using scanners and other techniques; how to capture and analyze network traffic with Wireshark; and learning about wireless security technologies, such as WEP, WPA/2/3, and their vulnerabilities. Continue by learning about cryptography and its four goals; learning to differentiate between symmetric and asymmetric cryptography; and learning how to choose a password cracking technique. Next, learn to differentiate between malware types and recognize the consequences of using targeted malware; learn to differentiate between scanning and enumeration; and learn the benefits of using Python to build scripts and deliver exploits. Then perform Linux privilege escalation with a penetration tester; perform Windows privilege escalation to exploit a Windows system by using the AlwaysInstallElevated technique; and use PowerShell to perform pen testing tasks such as reporting on all USB devices installed.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to find a vulnerability using scanners and other techniques
    Capture and analyze network traffic using wireshark
    Recognize wireless security technologies such as wep, wpa/2/3, and the vulnerabilities they have that could be exploited
    Describe cryptography and its four goals
    Differentiate between symmetric and asymmetric cryptography
    Recognize how to choose a password cracking technique
  • Differentiate between malware types and recognize some of the consequences of using targeted malware
    Differentiate between scanning and enumeration
    Recognize the benefits of using python to build scripts and deliver exploits
    Perform linux privilege escalation via writeable /etc/passwd file
    Perform windows privilege escalation to exploit a windows system using the alwaysinstallelevated technique
    Use powershell to perform pen testing tasks such as reporting on all usb devices installed, killing processes, and using psdrive to view objects in windows 
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 44s
  • 6m 29s
    Upon completion of this video, you will be able to describe how to find vulnerabilities using scanners and other techniques. FREE ACCESS
  • Locked
    3.  Sniffing Network Traffic
    6m 56s
    During this video, you will learn how to capture and analyze network traffic using Wireshark. FREE ACCESS
  • Locked
    4.  Targeting Wireless Networks
    8m 55s
    Upon completion of this video, you will be able to recognize wireless security technologies such as WEP, WPA/2/3, and the vulnerabilities they have that could be exploited. FREE ACCESS
  • Locked
    5.  Cryptography
    4m 46s
    After completing this video, you will be able to describe cryptography and its four goals. FREE ACCESS
  • Locked
    6.  Symmetric vs. Asymmetric Cryptography
    7m 38s
    During this video, you will learn how to differentiate between symmetric and asymmetric cryptography. FREE ACCESS
  • Locked
    7.  Password Cracking
    5m 53s
    After completing this video, you will be able to recognize how to choose a password-cracking technique. FREE ACCESS
  • Locked
    8.  Malware
    6m 15s
    In this video, you will learn the difference between malware types and the consequences of using targeted malware. FREE ACCESS
  • Locked
    9.  Scanning and Enumeration
    9m 49s
    During this video, you will learn how to differentiate between scanning and enumeration. FREE ACCESS
  • Locked
    10.  Python for Penetration Testing
    4m 43s
    After completing this video, you will be able to recognize the benefits of using Python to build scripts and deliver exploits. FREE ACCESS
  • Locked
    11.  Linux Privilege Escalation
    5m 45s
    In this video, learn how to perform Linux privilege escalation by writing to the /etc/passwd file. FREE ACCESS
  • Locked
    12.  Windows Privilege Escalation
    5m 39s
    During this video, you will learn how to perform Windows privilege escalation to exploit a Windows system using the AlwaysInstallElevated technique. FREE ACCESS
  • Locked
    13.  Using PowerShell for Penetration Testing
    6m 18s
    In this video, you will use PowerShell to perform pen testing tasks such as reporting on all USB devices installed, killing processes, and using PSDrive to view objects in Windows. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 18s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 35 users Rating 4.7 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 434 users Rating 4.5 of 434 users (434)
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)