Penetration Testing Tools – Cyber Security Training Course & PDF Guides
$10.00
Price: 10.00 USD | Size: 6.45 GB | Duration : 19- Hours | 146 Video Lessons | Bonus : Pentest PDF Guides
BRAND:
ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
Description
Price: 10.00 USD | Size: 6.45 GB | Duration : 19- Hours | 146 Video Lessons | Bonus : Pentest PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 4.9
Penetration Testing Tools Online Training
This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target’s vulnerabilities. This training is also associated with the CompTIA PenTest+ certification.
In the world of network and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they’re not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated.
This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.
For anyone who leads a technology team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource.
Penetration Testing Tools: What You Need to Know
This Penetration Testing Tools training has videos that cover topics such as:
- Identifying vulnerabilities and building a plan of attack
- Exploiting targets revealed in scans and attacking devices
- Deploying industry pentest tools like Kali, network mappers, password crackers, and more
Who Should Take Penetration Testing Tools Training?
This Penetration Testing Tools training is considered foundational-level CompTIA training, which means it was designed for security technicians. This pentration testing skills course is valuable for new IT professionals with at least a year of experience with penetration testing tools and experienced security technicians looking to validate their CompTIA skills.
New or aspiring security technicians. For brand new security technicians, this Penetration Testing Tools training might be slightly specialized — there are fundamentals about network security that will provide a better foundation for a career at the very outset. However, learning how to use the tools used in penetration tests can make you a better network security operator and can eventually lead to getting placed on pentest teams — prepare for that eventuality with this training.
Experienced security technicians. If you’ve been working as a security technician for several years and you’ve been itching to advance in your career into doing penetration tests, this training will familiarize you with the tools that make them happen. Some are open source, others are paid products, but knowing the tools that support penetration testing can prepare you for the more advanced work of pentests and secure your place on those teams.
Pentesting Reconnaissance
1. Introduction to Pentesting Reconnaissance
5 mins
2. Pentesting Reconnaissance Tools
9 mins
3. Domain Information Tools
12 mins
4. IP and DNS Information Tools
6 mins
5. Combination OSINT Tools
8 mins
6. Breach Data Tools
4 mins
7. Pentesting Reconnaissance Review
2 mins
Pentest Enumeration and NMAP
1. Intro to Pentesting Enumeration
9 mins
2. Pentest Enumeration Tools
9 mins
3. Basic NMAP Commands
5 mins
4. Ping Scans with NMAP
4 mins
5. Scanning TCP and UDP with NMAP
5 mins
6. Identifying Host Attributes with NMAP
8 mins
7. Using NMAP Scripts
5 mins
8. Bypassing Firewalls with NMAP
5 mins
Enumerating Services and Vulnerabilities
1. Intro to Enumerating Services and Vulnerabilities
2 mins
2. Enumerating with Port Scanners
14 mins
3. Enumerating Web Servers
12 mins
4. Enumerating SMB and Shares
8 mins
5. Enumerating Vulnerabilities with Nessus
16 mins
6. Automating Enumeration
7 mins
7. Pentest Enumeration Review
3 mins
Social Engineering Attacks and Tools
1. Social Engineering Anatomy
9 mins
2. Social Engineering Attacks
7 mins
3. Social Engineering Tools
8 mins
4. Social Engineering Toolkit
16 mins
5. Using WifiPhisher
3 mins
6. Pharming With ShellPhish
5 mins
7. Social Engineering Review
3 mins
Exploits and Payloads
1. Exploits and Payloads
8 mins
2. Moving Files With PwnDrop
11 mins
3. Transferring Files with SMB and SCP
9 mins
4. Working With Exploits
16 mins
5. Working With Payloads
8 mins
6. Exploits and Payloads Review
2 mins
Metasploit Framework
1. Intro to the Metasploit Framework
4 mins
2. Metasploit Startup and Workspaces
6 mins
3. Metasploit Modules
10 mins
4. Metasploit Options and Payloads
9 mins
5. Managing Metasploit Sessions
3 mins
6. Using Meterpreter
9 mins
7. Metasploit Framework Review
2 mins
Network-Based Attacks and Tools
1. Network Based Attacks and Tools
11 mins
2. How Attacks Against ARP Work
5 mins
3. ARP Poisoning Attack
8 mins
4. How DNS Cache Poisoning Works
2 mins
5. DNS Cache Poisoning Attack
6 mins
6. VLAN Hopping Attacks
4 mins
7. Bypassing Network Access Control
5 mins
8. Network Based Attacks Review
6 mins
Host Protocol Attacks and Tools
1. Host Protocol Attacks and Tools Overview
5 mins
2. Server Message Block (SMB) Protocol
4 mins
3. Attacking the SMB Protocol
13 mins
4. Simple Network Management Protocol (SNMP)
5 mins
5. Exploiting the SNMP Protocol
13 mins
6. Denial of Service Attacks
5 mins
7. Analyzing the LLMNR Protocol
4 mins
8. Attacking the LLMNR Protocol
6 mins
9. Host Protocol Attacks and Tools Review
3 mins
Wireless and Mobile Device Attacks and Tools
1. Wireless and Mobile Device Attacks and Tools
9 mins
2. Sniffing Wireless Data
6 mins
3. Wireless Analysis With Kismet
7 mins
4. Wireless Deauthentication Attacks
3 mins
5. Cracking WPA2 Preshared Keys
4 mins
6. Wireless Evil Twin Attack
8 mins
7. Automated Wifi Attack Tools
6 mins
8. Section Review
4 mins
Web Application Vulnerabilities
1. OWASP Top 10 (1 thru 3)
11 mins
2. OWASP Top 10 (4 thru 6)
7 mins
3. OWASP Top 10 (7 thru 10)
9 mins
4. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)
4 mins
5. SQL Injection Attacks
4 mins
6. File Inclusion Vulnerabilities
8 mins
7. Additional Web App Vulnerabilities and Attacks
6 mins
Web Application Pentesting
1. Web Application Pentesting
3 mins
2. OWASP ZAP
11 mins
3. Attack Scans Using OWASP ZAP
5 mins
4. Brute Force Attack Using OWASP ZAP
6 mins
5. SQL Injection Using SQLmap
12 mins
6. Local and Remote File Inclusion Attacks
8 mins
7. Cross Site Scripting (XSS) Attacks
6 mins
All About Shells
1. Bind and Reverse Shells
8 mins
2. The Power of Web Shells
11 mins
3. Working With Bind and Reverse Shells
7 mins
4. Shell One-Liners
5 mins
5. Spawning Meterpreter Shells
13 mins
6. Log Poisoning for a Shell
6 mins
Windows Localhost Vulnerabilities, Attacks, and Tools
1. Windows Privilege Escalation Pt.1
8 mins
2. Windows Privilege Escalation Pt.2
6 mins
3. Getting a Windows Shell
9 mins
4. Windows Local Host Enumeration
9 mins
5. Windows Unquoted Service Path Vulnerability
9 mins
6. Windows Local Exploit Privilege Escalation
12 mins
Linux Localhost Vulnerabilities, Attacks, and Tools
1. Introduction to Privilege Escalation
10 mins
2. Linux Privilege Escalation Pt.1
7 mins
3. Linux Privilege Escalation Pt.2
7 mins
4. Linux Shell Escalation
6 mins
5. Linux Local Host Enumeration
10 mins
6. Linux Privilege Escalation Via Cron Jobs
9 mins
7. Linux SUID and SUDO privilege escalation
8 mins
8. Linux Local Exploit Privilege Escalation
11 mins
Physical Penetration Testing
1. Physical Pentest Documents
8 mins
2. Reconnaissance and Planning
6 mins
3. Physical Pentest Tools
14 mins
4. Getting Inside
7 mins
5. Continuing From the Inside
8 mins
6. Physical Pentest Report
6 mins
Credential Attacks
1. Credential Attacks Pt.1
7 mins
2. Credential Attacks Pt.2
9 mins
3. Creating Custom Wordlists
12 mins
4. Performing a Brute Force Attack
8 mins
5. Cracking Hashed Passwords
11 mins
6. Executing a Pass the Hash Attack
4 mins
Performing Attacks on Cloud Technologies
1. Credential Harvesting and PrivEsc in the Cloud
14 mins
2. Running PACU
11 mins
3. Misconfigured Cloud Assets
9 mins
4. Running CloudSploit
7 mins
5. Resource Exhaustion, Malware Injection and API Attacks
7 mins
6. Side Channel and Direct-To-Origin Attacks
7 mins
7. Additional Cloud Pentesting Tools
4 mins
Attacks and Vulnerabilities of Specialized Systems
1. Mobile Device Attacks
5 mins
2. Mobile Device Vulnerabilities
12 mins
3. Mobile Security Tools
6 mins
4. Internet of Things (IoT) Devices
8 mins
5. Data Storage System Vulnerabilities
8 mins
6. SCADA, IIoT and ICS Vulnerabilities
5 mins
7. Virtual Environment Vulnerabilities
6 mins
Post Exploit Activities
1. Establishing Persistence
5 mins
2. Lateral Movement
9 mins
3. Data Exfiltration
7 mins
4. Covering Your Tracks
6 mins
5. Linux Post Exploit Activities
10 mins
6. Windows Post Exploit Activities
11 mins
Scripting Basics
1. Analyze a Basic Script
5 mins
2. Scripting Basics
9 mins
3. Assigning Values to Variables
8 mins
4. Operating on Variables with Operators
7 mins
5. Branching Code with Conditionals
9 mins
6. Reapeating Code with Loops
11 mins
7. Handling Errors in Code
7 mins
Analyzing Scripts
1. Intro
1 min
2. Analyzing PING Scripts
14 mins
3. Downloading Files with Scripts
4 mins
4. Automation with Scripts
11 mins
5. Updating IP Settings with a Script
6 mins
6. NMAP Reports in HTML
6 mins
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.