Penetration Testing Fundamentals
(pearson-pentest-complete)
/ ISBN: 978-1-61691-029-7
This course includes
Lessons
TestPrep
LiveLab
Instructor Led (Add-on)
Video Lessons (Add-on)
Mentoring (Add-on)
Penetration Testing Fundamentals
Know everything about IT penetration testing with the Penetration Testing Fundamentals course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The course and lab cover all the concepts, terminology, and challenges in Metasploit, provide skills required to write or customize sophisticated Metasploit exploits, general hacking techniques and knowledge, and some additional penetration testing concepts.
Lessons
-
19+ Lessons
-
112+ Quizzes
-
120+ Flashcards
-
120+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
LiveLab
-
57+ LiveLab
Video Tutorials (Add-on)
-
109+ Video tutorials
- What Is Penetration Testing?
- Terminology
- Methodologies
- Ethical Issues
- Legal Issues
- Certifications
- Careers in Penetration Testing
- Building Your Skillset
- Summary
- Test Your Skills
- PCI DSS
- NIST 800-115
- National Security Agency InfoSec Assessment Methodology (NSA-IAM)
- PTES
- CREST (UK)
- A Synthesis (Putting Standards Together into a Single Unified Approach)
- Related Standards
- Other Standards
- Summary
- Test Your Skills
- Cryptography Basics
- History of Encryption
- Modern Methods
- Public Key (Asymmetric) Encryption
- Digital Signatures
- Hashing
- MAC and HMAC
- Password Crackers
- Steganography
- Cryptanalysis
- Learning More
- Summary
- Test Your Skills
- Passive Scanning Techniques
- Active Scanning Techniques
- Wireshark
- Maltego
- Other OSINT Tools
- Summary
- Test Your Skills
- Viruses
- Trojan Horses
- Other Forms of Malware
- Creating Malware
- Summary
- Test Your Skills
- Windows Details
- Windows Password Hashing
- Windows Hacking Techniques
- Windows Scripting
- Windows Password Cracking
- Detecting Malware in Windows
- Cain and Abel
- Summary
- Test Your Skills
- Web Technology
- Specific Attacks on Websites
- Tools
- Summary
- Test Your Skills
- Vulnerabilities
- Packet Capture
- Network Scanners
- Wireless Scanners/Crackers
- General Scanners
- Web Application Scanners
- Cyber Threat Intelligence
- Summary
- Test Your Skills
- Linux History
- Linux Commands
- Directories
- Graphical User Interface
- Summary
- Test Your Skills
- More on the Linux OS
- Linux Firewall
- Syslogd
- Scripting
- Linux Passwords
- Linux Hacking Tricks
- Summary
- Test Your Skills
- Kali Linux History
- Kali Basics
- Kali Tools
- Summary
- Test Your Skills
- Wi-Fi Testing
- Social Engineering
- DoS
- Summary
- Test Your Skills
- Background on Metasploit
- Getting Started with Metasploit
- Basic Usage of msfconsole
- Scanning with Metasploit
- How to Use Exploits
- Exploit Examples
- Post Exploits
- Summary
- Test Your Skills
- Meterpreter and Post Exploits
- msfvenom
- More Metasploit Attacks
- Summary
- Test Your Skills
- Getting Started
- Basic Ruby Scripting
- Summary
- Test Your Skills
- The API
- Getting Started
- Examine an Existing Exploit
- Extending Existing Exploits
- Writing Your First Exploit
- Summary
- Test Your Skills
- Conferences
- Dark Web
- Certification and Training
- Cyber Warfare and Terrorism
- Nation State Actors
- Summary
- Test Your Skills
- Wireless Pen Testing
- Mainframe and SCADA
- Mobile Pen Testing
- Summary
- Test Your Skills
- Pen Test Outline
- Report Outline
- Summary
Hands on Activities (Live Labs)
- Reviewing an Authorization Letter for Penetration Testing
- Reviewing a Confidential Penetration Report
- Using OpenSSL to Create a Public/Private Key Pair
- Observing an SHA-Generated Hash Value
- Observing an MD5-Generated Hash Value
- Using Cain and Abel
- Using DeepSound
- Detecting a Phishing Site Using Netcraft
- Searching with builtwith.com
- Observing a Website Using archive.org
- Using Shodan
- Scanning Live Systems Using Nmap
- Scanning an OS Using Nmap
- Scanning a Port Using nmap
- Enumerating Data Using enum4linux
- Using Wireshark
- Using Maltego
- Causing a DarkComet Trojan Infection
- Creating a Trojan File
- Scanning Malware Using Antivirus
- Covering Tracks
- Using the net Command
- Cracking Windows Password Using Ophcrack
- Cracking a Linux Password Using John the Ripper
- Exploiting a Website Using SQL Injection
- Attacking a Website Using XSS Injection
- Using Burp Suite
- Using BeEF
- Reviewing the Top 10 OWASP Attacks
- Consulting a Vulnerability Database
- Capturing Network Packets Using tcpdump
- Grabbing User Credentials Using Wireshark
- Scanning a Network using LanHelper
- Using MBSA
- Conducting Vulnerability Scanning Using Nessus
- Conducting Web Application Vulnerability Scanning Using OWASP ZAP
- Using Basic Linux Commands
- Creating a Personal Linux Firewall Using iptables
- Writing Bash Shell Script
- Installing Kali Linux
- Using Sparta
- Performing a DoS Attack with the SYN Flood
- Simulating DDoS Attack
- Exploiting Windows 7 Using Metasploit
- Searching Vulnerability Using Metasploit
- Grabbing a Screenshot of a Target Machine Using Metasploit
- Scanning Ports Using Metasploit
- Create Unlimited Folders in a Victim Machine using Metasploit
- Hiding a Remote Machine Disk Using Metasploit
- Hacking Windows Using Metasploit
- Enabling a Keylogger in a Target Machine
- Enabling Payload on a Target Machine Using Metasploit
- Getting a Persistence Session of Metasploit
- Creating Ruby Script
- Creating Ruby Script for Arithmetic Operations
- Creating Ruby Script for Loops
- Creating Ruby Script to Run Commands
Yukyung Jung
Gracia Stalin
Vivek Kadam
Show more
×