Fearless Penetration Testing Bootcamp

  • 2 Courses | 6h 50m 22s
  • 11 Books | 52h 58m
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
 
The Fearless Penetration Testing Bootcamp will be beneficial for anyone working in Cyber Security. The content will focus on gaining specific knowledge around physical penetration testing, social engineering, and vulnerability scanning. Finishing with the importance of documentation and report writing. The content will discuss some of the tools and methods used by hackers to gain access to computer systems and networks. We will dig into how to break into a secure facility, use social engineering to gain access to a network, and conduct a basic network penetration test. We will cover the importance of a strong rules of engagement, and what to include in the report at the end of your penetration test. This course will be useful for anyone looking to get into cyber security or better understand the attack methodologies used by cyber criminals. The course will run over 2 days, 4 hours per day, in an interactive lecture format. No certifications are required to attend this course; however, a basic understanding of cyber security is required.

COURSES INCLUDED

Fearless Penetration Testing Bootcamp: Session 1 Replay
This is a recorded Replay of the Fearless Penetration Testing Live session that ran on June 28th at 11 AM ET. In this session William MacDonald discusses the rules of engagement and OSINT.
2 videos | 3h 24m available Badge
Fearless Penetration Testing Bootcamp: Session 2 Replay
This is a recorded Replay of the Fearless Penetration Testing Live session that ran on June 29th at 11 AM ET. In this session William MacDonald discusses social engineering, penetration testing, and documentation.
2 videos | 3h 26m available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Professional Pen Testing for Web Applications
Written for programmers, developers, and IS professionals who want to learn about web application security and how to audit it, this book will help you become an effective penetrator in order to circumvent security features of Web applications.
book Duration 8h 35m book Authors By Andres Andreu

Book

Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
Providing easy-to-understand models and examples, this hands-on resource gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
book Duration 7h 53m book Authors By Andrew Mason, Gavin Watson, Richard Ackroyd

Book

The Art of Network Penetration Testing: How to Take Over Any Company in the World
Teaching you how to take over an enterprise network from the inside, this book lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage.
book Duration 5h 9m book Authors By Royce Davis

Book

The Penetration Tester's Guide to Web Applications
Focusing on offensive security and how to attack web applications, this innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities.
book Duration 2h 57m book Authors By Serge Borso

Book

Penetration Testing: A Guide For Business and IT Managers
Explaining the process of penetration testing and the benefits it brings, this book provides essential insight and tips for setting up a penetration testing program, maintaining it, and responding to the results.
book Duration 3h 51m book Authors By BCS-CREST Penetration Testing Working Group

Book

Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Focusing on the three most powerful pentesting tools, this book will get you started with NMAP, OpenVAS, and Metasploit and will help you understand how they can be integrated with each other for greater flexibility and efficiency.
book Duration 50m book Authors By Sagar Rahalkar

Book

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
By using disguise, espionage, stealth, and concealment, this book throws traditional pen testing methods out the window to demonstrate how thinking and acting like a ninja can actually grant you quicker, more complete access to a company's assets - before a hacker does.
book Duration 7h 14m book Authors By Jason Andress, Thomas Wilhelm

Book

Coding for Penetration Testers: Building Better Tools
Providing an understanding of the scripting languages that are commonly used when developing tools for penetration testing, this book guides you through specific examples of custom tool development and the situations where such tools might be used.
book Duration 5h 44m book Authors By Jason Andress, Ryan Linn

Book

Hacking and Penetration Testing with Low Power Devices
Designed to keep you at the top of your game performing cutting-edge pen tests from anywhere in the world, this book shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered.
book Duration 4h 2m book Authors By Philip Polstra

Book

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments.
book Duration 3h 59m book Authors By Wil Allsopp

Book

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed.
book Duration 2h 44m book Authors By Ric Messier
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)