Information Security: Pen Testing
IT Security
| Beginner
- 14 videos | 1h 34m 44s
- Includes Assessment
- Earns a Badge
Explore the key penetration (pen) testing concepts such as vulnerability assessment, types of pen testing, and threat actors, in this 14-video course. Discover why pen testing is needed and investigate tools used for pen testing. Key concepts covered in this course include pen testing, a set of tasks that are performed by ethical hackers against an organization, but in a legal way; steps performed during the pen testing process; and reasons why an organization needs to perform pen testing and distinguish between pen testing and vulnerability assessments. Next, you will compare the different types of pen testing and learn the weaknesses of pen testing; learn the various types of tools used in pen testing and the target selection for pen testing; and learn the types of assets in an organization; compare the types of risk responses that an organization may adapt. Finally, learners observe how to use the Metasploit framework in Kali Linux; and how to create an exploit by using MSFvenom.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseList the steps performed during the pen testing processSpecify the reasons an organization needs to perform pen testingDistinguish between pen testing and vulnerability assessmentsCompare different types of pen testingList the weaknesses of pen testingIdentify the various types of tools used in pen testing
-
Describe the target selection for pen testingIdentify the threat actorsDescribe the types of assets in an organizationCompare the types of risk responses that an organization may adaptUse the metasploit framework in kali linuxCreate an exploit using msfvenomSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 32s
-
6m 20sAfter completing this video, you will be able to list the steps involved in the pen testing process. FREE ACCESS
-
5m 36sAfter completing this video, you will be able to specify the reasons an organization needs to perform penetration testing. FREE ACCESS
-
11m 8sIn this video, you will learn the difference between pen testing and vulnerability assessments. FREE ACCESS
-
4m 59sTo compare different types of pen testing, research how they are conducted and what benefits each offers. FREE ACCESS
-
7m 32sUpon completion of this video, you will be able to list the weaknesses of penetration testing. FREE ACCESS
-
10m 33sIn this video, you will learn how to identify the various types of tools used in penetration testing. FREE ACCESS
-
3m 14sUpon completion of this video, you will be able to describe the target selection process for pen testing. FREE ACCESS
-
7m 32sIn this video, learn how to identify threat actors. FREE ACCESS
-
11m 27sAfter completing this video, you will be able to describe the types of assets in an organization. FREE ACCESS
-
14m 21sLearn how to compare the types of risk responses that an organization may adopt. FREE ACCESS
-
4m 16sIn this video, you will learn how to use the Metasploit framework in Kali Linux. FREE ACCESS
-
4m 51sIn this video, you will learn how to create an exploit using MSFvenom. FREE ACCESS
-
1m 23s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.