Penetration Testing Fundamentals
IT Security
| Beginner
- 14 videos | 1h 18m 32s
- Includes Assessment
- Earns a Badge
This 14-video course explores penetration testing, and the role it plays in protecting a company's assets and networks from exploitation and attacks. In this course, users learn how penetration testing can expose security weaknesses. You will also learn about different types of penetration testing, and how to test for common penetration types, and you will examine the importance of penetration testing for an organization. This course demonstrates passive information gathering, or open- source gathering to search for available information about the organization. You will learn to use active information gathering to target the organization's systems, the employees, their networks to gain information. Next, explore several different types of exploits that can cause problems, including buffer overflow attacks, client side and website attacks, password attacks, and port forwarding exploits; and learn how to conduct a privilege escalation attack. Finally, you will examine how penetration testers and bad actors can gain access to a system by using network tunneling.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe what penetration testing is and why it is important to the organizationDescribe the common types of penetration and the importance of testing each typeDescribe passive information gathering and methods for collecting informationDescribe active information gathering along with methods and techniques for collecting informationCompare vulnerability to penetration testing and describe the function of eachDescribe the cause of buffer overflow and how this exploit can be used for attacks
-
Describe user privilege escalation and methods that can be used to protect your system from security attacksDescribe common client-side attacks such as cross-site scripting attacks and methods to help prevent themDescribe common web cyber attacks and countermeasures to prevent these attacksDescribe common password attacks and methods for preventing themDescribe port forwarding and how it can be used as an exploitDescribe the purpose of network tunneling and why it is important for penetration testingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 27s
-
7m 13sUpon completion of this video, you will be able to describe what penetration testing is and why it is important to organizations. FREE ACCESS
-
8m 46sAfter completing this video, you will be able to describe the common types of penetration and the importance of testing each type. FREE ACCESS
-
4m 55sUpon completion of this video, you will be able to describe passive information gathering and methods for collecting information. FREE ACCESS
-
5m 34sAfter completing this video, you will be able to describe active information gathering, along with methods and techniques for collecting information. FREE ACCESS
-
7m 28sLearn how to compare vulnerability to penetration testing and describe the function of each. FREE ACCESS
-
4m 59sAfter completing this video, you will be able to describe the cause of buffer overflow and how this exploit can be used for attacks. FREE ACCESS
-
5m 32sUpon completion of this video, you will be able to describe user privilege escalation and methods that can be used to protect your system from security attacks. FREE ACCESS
-
5m 49sAfter completing this video, you will be able to describe common client-side attacks, such as Cross-Site Scripting attacks, and methods to help prevent them. FREE ACCESS
-
7mUpon completion of this video, you will be able to describe common web cyber attacks and their corresponding countermeasures. FREE ACCESS
-
7m 29sAfter completing this video, you will be able to describe common password attacks and methods for preventing them. FREE ACCESS
-
6m 44sUpon completion of this video, you will be able to describe port forwarding and how it can be used to exploit a system. FREE ACCESS
-
4m 40sUpon completion of this video, you will be able to describe the purpose of network tunneling and why it is important for penetration testing. FREE ACCESS
-
57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.