Sale!

Penetration Testing Tools – Cyber Security Training Course & PDF Guides

Original price was: $25.00.Current price is: $10.00.

  • Price: $10.00 USD
  • Size: 2.58 GB
  • Duration: 11+ Hours
  • Number of Video Lessons: 40
  • Brand:
  • Language: English
  • Bonus: Free Pentest PDF Guides
  • Delivery: Instant Download
  • Rating: ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Penetration Testing Tools – Cyber Security Training Course & PDF Guides

This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target’s vulnerabilities. This training is also associated with the CompTIA PenTest+ certification, which is a valuable credential for cybersecurity professionals.

In the world of network security and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a secret: a lot of the work is done with industry-standard tools. These tools aren’t fire-and-forget or mindless seek-and-destroy missiles, but much of the mystique surrounding penetration testing can be replicated using the right set of software and commands.

Pentesting Reconnaissance

  1. Introduction to Pentesting Reconnaissance
  2. Pentesting Reconnaissance Tools
  3. Domain Information Tools
  4. IP and DNS Information Tools
  5. Combination OSINT Tools
  6. Breach Data Tools
  7. Pentesting Reconnaissance Review

Pentest Enumeration and NMAP

  1. Intro to Pentesting Enumeration
  2. Pentest Enumeration Tools
  3. Basic NMAP Commands
  4. Ping Scans with NMAP
  5. Scanning TCP and UDP with NMAP
  6. Identifying Host Attributes with NMAP
  7. Using NMAP Scripts
  8. Bypassing Firewalls with NMAP

Enumerating Services and Vulnerabilities

  1. Intro to Enumerating Services and Vulnerabilities
  2. Enumerating with Port Scanners
  3. Enumerating Web Servers
  4. Enumerating SMB and Shares
  5. Enumerating Vulnerabilities with Nessus
  6. Automating Enumeration
  7. Pentest Enumeration Review

Social Engineering Attacks and Tools

  1. Social Engineering Anatomy
  2. Social Engineering Attacks
  3. Social Engineering Tools
  4. Social Engineering Toolkit
  5. Using WifiPhisher
  6. Pharming With ShellPhish
  7. Social Engineering Review

Exploits and Payloads

  1. Exploits and Payloads
  2. Moving Files With PwnDrop
  3. Transferring Files with SMB and SCP
  4. Working With Exploits
  5. Working With Payloads
  6. Exploits and Payloads Review

Metasploit Framework

  1. Intro to the Metasploit Framework
  2. Metasploit Startup and Workspaces
  3. Metasploit Modules
  4. Metasploit Options and Payloads
  5. Managing Metasploit Sessions
  6. Using Meterpreter
  7. Metasploit Framework Review

Network-Based Attacks and Tools

  1. Network-Based Attacks and Tools
  2. How Attacks Against ARP Work
  3. ARP Poisoning Attack
  4. How DNS Cache Poisoning Works
  5. DNS Cache Poisoning Attack
  6. VLAN Hopping Attacks
  7. Bypassing Network Access Control
  8. Network Based Attacks Review

 

Who Should Take Penetration Testing with Linux Tools Training?

This penetration testing skills course is designed for systems administrators with three to five years of experience with open source platforms.

Experienced IT professionals. If you’ve already spent several years in systems administration or information security and you’re looking to move into “white hat” hacking, this training is where to start. The training is entry-level security training but rests on intermediate networking knowledge, so it depends on some level of pre-existing familiarity with systems and networks. With this Penetration Testing with Linux Tools training, you’ll be equipped to set-up your networks so they’re safe as well as perform penetration testing to check them.


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.