Information Security: Pen Testing

IT Security    |    Beginner
  • 14 videos | 1h 34m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 52 users Rating 4.6 of 52 users (52)
Explore the key penetration (pen) testing concepts such as vulnerability assessment, types of pen testing, and threat actors, in this 14-video course. Discover why pen testing is needed and investigate tools used for pen testing. Key concepts covered in this course include pen testing, a set of tasks that are performed by ethical hackers against an organization, but in a legal way; steps performed during the pen testing process; and reasons why an organization needs to perform pen testing and distinguish between pen testing and vulnerability assessments. Next, you will compare the different types of pen testing and learn the weaknesses of pen testing; learn the various types of tools used in pen testing and the target selection for pen testing; and learn the types of assets in an organization; compare the types of risk responses that an organization may adapt. Finally, learners observe how to use the Metasploit framework in Kali Linux; and how to create an exploit by using MSFvenom.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    List the steps performed during the pen testing process
    Specify the reasons an organization needs to perform pen testing
    Distinguish between pen testing and vulnerability assessments
    Compare different types of pen testing
    List the weaknesses of pen testing
    Identify the various types of tools used in pen testing
  • Describe the target selection for pen testing
    Identify the threat actors
    Describe the types of assets in an organization
    Compare the types of risk responses that an organization may adapt
    Use the metasploit framework in kali linux
    Create an exploit using msfvenom
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 32s
  • 6m 20s
    After completing this video, you will be able to list the steps involved in the pen testing process. FREE ACCESS
  • Locked
    3.  Need for Pen Testing
    5m 36s
    After completing this video, you will be able to specify the reasons an organization needs to perform penetration testing. FREE ACCESS
  • Locked
    4.  Pen Testing and Vulnerability Assessment
    11m 8s
    In this video, you will learn the difference between pen testing and vulnerability assessments. FREE ACCESS
  • Locked
    5.  Types of Pen Testing
    4m 59s
    To compare different types of pen testing, research how they are conducted and what benefits each offers. FREE ACCESS
  • Locked
    6.  Pen Testing Weaknesses
    7m 32s
    Upon completion of this video, you will be able to list the weaknesses of penetration testing. FREE ACCESS
  • Locked
    7.  Types of Pen Testing Tools
    10m 33s
    In this video, you will learn how to identify the various types of tools used in penetration testing. FREE ACCESS
  • Locked
    8.  Target Selection for Pen Testing
    3m 14s
    Upon completion of this video, you will be able to describe the target selection process for pen testing. FREE ACCESS
  • Locked
    9.  Threat Actors
    7m 32s
    In this video, learn how to identify threat actors. FREE ACCESS
  • Locked
    10.  Types of Assets
    11m 27s
    After completing this video, you will be able to describe the types of assets in an organization. FREE ACCESS
  • Locked
    11.  Types of Risk Responses
    14m 21s
    Learn how to compare the types of risk responses that an organization may adopt. FREE ACCESS
  • Locked
    12.  Metasploit Framework
    4m 16s
    In this video, you will learn how to use the Metasploit framework in Kali Linux. FREE ACCESS
  • Locked
    13.  MSFvenom
    4m 51s
    In this video, you will learn how to create an exploit using MSFvenom. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 23s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 291 users Rating 4.1 of 291 users (291)
Rating 4.3 of 120 users Rating 4.3 of 120 users (120)
Rating 4.4 of 60 users Rating 4.4 of 60 users (60)