PenTesting for Physical Security

IT Security    |    Intermediate
  • 14 Videos | 1h 13m 22s
  • Includes Assessment
  • Earns a Badge
Likes 30 Likes 30
This 14-video course explores physical penetration testing, and how to test a business's infrastructure, including IT assets, its data, people, and physical security to locate any exploitable vulnerabilities. In this course, you will learn why lockpicking is essential in cybersecurity, and you will examine different types of locks and lockpick tools. This course demonstrates several types of penetrations, including EM (electromagnetic security vulnerabilities), dumpster diving, and tailgating, and how to protect against these attacks. You will learn about penetration testing types, including network services, web and client applications, Cloud penetration, penetration testing of wireless networks, and social engineering. Learners will explore several penetration tools, including Kali Linux, which comes with tool such as Nmap, Wireshark, and John the Ripper; the Aircrack suite; OpenVas, and several others. You will learn about web app security testing methodologies. Learners will observe the elements of a successful report, and how to document penetration testing results. Finally, this course demonstrates practicing testing skills by using Grier Demo website.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the importance of physical penetration testing and why organizations must perform penetration testing
    describe the steps necessary to implement a physical penetration testing program and the phases of penetration testing
    identify different lock pick tools and why lock picking is important in cybersecurity
    describe how to protect sensitive data with security testing and the five penetration testing rules of engagement
    describe penetration testing tools that are used by professional hackers
    identify the types of penetration testing and common terminology
  • describe electromagnetic security vulnerabilities and devices that can help prevent this method of attack
    describe the purpose and results of dumpster diving and how to protect against this form of attack
    identify how to recognize and prevent tailgating and recognize the risks that it exposes
    describe how to document the findings of physical penetration testing and the key components of the report
    identify web application security testing methodologies and the five stages of OPSEC
    perform penetration testing using the Gruyere demo web site
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 57s
    UP NEXT
  • Playable
    2. 
    Physical Penetration Testing
    4m 12s
  • Locked
    3. 
    Implementing a Physical Pen Testing Plan
    4m 22s
  • Locked
    4. 
    Pen Testing Lock Pick Tools
    4m 44s
  • Locked
    5. 
    Protecting Sensitive Data
    7m 1s
  • Locked
    6. 
    Penetration Tools and Techniques
    8m 35s
  • Locked
    7. 
    Penetration Testing Types
    5m 5s
  • Locked
    8. 
    Electromagnetic Security Vulnerabilities
    3m 18s
  • Locked
    9. 
    Penetration Testing Dumpster Diving
    6m 2s
  • Locked
    10. 
    Tailgating Security Risks
    3m 22s
  • Locked
    11. 
    Physical Penetration Testing Report
    7m 7s
  • Locked
    12. 
    Web App Security Testing Methodologies
    5m 8s
  • Locked
    13. 
    Web Site Penetration Test
    5m
  • Locked
    14. 
    Course Summary
    1m 29s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 12 Likes 12  
Likes 35 Likes 35  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE