Advanced Pen Testing Techniques
IT Security
| Expert
- 14 Videos | 1h 22m 6s
- Includes Assessment
- Earns a Badge
Explore advanced penetration testing tools and techniques used to find vulnerabilities, sniff network traffic, deal with cryptography, and crack passwords in this 14-video course. Learners will discover common techniques used to find weaknesses in both Linux and Windows-based systems. Key concepts covered here include finding vulnerability by using scanners and other techniques; how to capture and analyze network traffic with Wireshark; and learning about wireless security technologies, such as WEP, WPA/2/3, and their vulnerabilities. Continue by learning about cryptography and its four goals; learning to differentiate between symmetric and asymmetric cryptography; and learning how to choose a password cracking technique. Next, learn to differentiate between malware types and recognize the consequences of using targeted malware; learn to differentiate between scanning and enumeration; and learn the benefits of using Python to build scripts and deliver exploits. Then perform Linux privilege escalation with a penetration tester; perform Windows privilege escalation to exploit a Windows system by using the AlwaysInstallElevated technique; and use PowerShell to perform pen testing tasks such as reporting on all USB devices installed.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe how to find a vulnerability using scanners and other techniquescapture and analyze network traffic using Wiresharkrecognize wireless security technologies such as WEP, WPA/2/3, and the vulnerabilities they have that could be exploiteddescribe cryptography and its four goalsdifferentiate between symmetric and asymmetric cryptographyrecognize how to choose a password cracking technique
-
differentiate between malware types and recognize some of the consequences of using targeted malwaredifferentiate between scanning and enumerationrecognize the benefits of using Python to build scripts and deliver exploitsperform Linux privilege escalation via writeable /etc/passwd fileperform Windows privilege escalation to exploit a Windows system using the AlwaysInstallElevated techniqueuse PowerShell to perform pen testing tasks such as reporting on all USB devices installed, killing processes, and using PSDrive to view objects in Windowssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 44sUP NEXT
-
2.Finding a Vulnerability6m 29s
-
3.Sniffing Network Traffic6m 56s
-
4.Targeting Wireless Networks8m 55s
-
5.Cryptography4m 46s
-
6.Symmetric vs. Asymmetric Cryptography7m 38s
-
7.Password Cracking5m 53s
-
8.Malware6m 15s
-
9.Scanning and Enumeration9m 49s
-
10.Python for Penetration Testing4m 43s
-
11.Linux Privilege Escalation5m 45s
-
12.Windows Privilege Escalation5m 39s
-
13.Using PowerShell for Penetration Testing6m 18s
-
14.Course Summary1m 18s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.