Penetration Testing Fundamentals

IT Security    |    Beginner
  • 14 videos | 1h 18m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 67 users Rating 4.7 of 67 users (67)
This 14-video course explores penetration testing, and the role it plays in protecting a company's assets and networks from exploitation and attacks. In this course, users learn how penetration testing can expose security weaknesses. You will also learn about different types of penetration testing, and how to test for common penetration types, and you will examine the importance of penetration testing for an organization. This course demonstrates passive information gathering, or open- source gathering to search for available information about the organization. You will learn to use active information gathering to target the organization's systems, the employees, their networks to gain information. Next, explore several different types of exploits that can cause problems, including buffer overflow attacks, client side and website attacks, password attacks, and port forwarding exploits; and learn how to conduct a privilege escalation attack. Finally, you will examine how penetration testers and bad actors can gain access to a system by using network tunneling.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe what penetration testing is and why it is important to the organization
    Describe the common types of penetration and the importance of testing each type
    Describe passive information gathering and methods for collecting information
    Describe active information gathering along with methods and techniques for collecting information
    Compare vulnerability to penetration testing and describe the function of each
    Describe the cause of buffer overflow and how this exploit can be used for attacks
  • Describe user privilege escalation and methods that can be used to protect your system from security attacks
    Describe common client-side attacks such as cross-site scripting attacks and methods to help prevent them
    Describe common web cyber attacks and countermeasures to prevent these attacks
    Describe common password attacks and methods for preventing them
    Describe port forwarding and how it can be used as an exploit
    Describe the purpose of network tunneling and why it is important for penetration testing
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 27s
  • 7m 13s
    Upon completion of this video, you will be able to describe what penetration testing is and why it is important to organizations. FREE ACCESS
  • Locked
    3.  Penetration Testing Types
    8m 46s
    After completing this video, you will be able to describe the common types of penetration and the importance of testing each type. FREE ACCESS
  • Locked
    4.  Passive Information Gathering
    4m 55s
    Upon completion of this video, you will be able to describe passive information gathering and methods for collecting information. FREE ACCESS
  • Locked
    5.  Active Information Gathering
    5m 34s
    After completing this video, you will be able to describe active information gathering, along with methods and techniques for collecting information. FREE ACCESS
  • Locked
    6.  Vulnerability Scanning
    7m 28s
    Learn how to compare vulnerability to penetration testing and describe the function of each. FREE ACCESS
  • Locked
    7.  Buffer Overflow Exploits
    4m 59s
    After completing this video, you will be able to describe the cause of buffer overflow and how this exploit can be used for attacks. FREE ACCESS
  • Locked
    8.  Privilege Escalation
    5m 32s
    Upon completion of this video, you will be able to describe user privilege escalation and methods that can be used to protect your system from security attacks. FREE ACCESS
  • Locked
    9.  Client-side Attacks
    5m 49s
    After completing this video, you will be able to describe common client-side attacks, such as Cross-Site Scripting attacks, and methods to help prevent them. FREE ACCESS
  • Locked
    10.  Web Attacks
    7m
    Upon completion of this video, you will be able to describe common web cyber attacks and their corresponding countermeasures. FREE ACCESS
  • Locked
    11.  Password Attacks
    7m 29s
    After completing this video, you will be able to describe common password attacks and methods for preventing them. FREE ACCESS
  • Locked
    12.  Port Forwarding Exploits
    6m 44s
    Upon completion of this video, you will be able to describe port forwarding and how it can be used to exploit a system. FREE ACCESS
  • Locked
    13.  Network Tunneling
    4m 40s
    Upon completion of this video, you will be able to describe the purpose of network tunneling and why it is important for penetration testing. FREE ACCESS
  • Locked
    14.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.4 of 106 users Rating 4.4 of 106 users (106)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 220 users Rating 4.7 of 220 users (220)
Rating 4.4 of 135 users Rating 4.4 of 135 users (135)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)