PenTesting for Physical Security

IT Security    |    Intermediate
  • 14 videos | 1h 7m 22s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 18 users Rating 4.2 of 18 users (18)
This 14-video course explores physical penetration testing, and how to test a business's infrastructure, including IT assets, its data, people, and physical security to locate any exploitable vulnerabilities. In this course, you will learn why lockpicking is essential in cybersecurity, and you will examine different types of locks and lockpick tools. This course demonstrates several types of penetrations, including EM (electromagnetic security vulnerabilities), dumpster diving, and tailgating, and how to protect against these attacks. You will learn about penetration testing types, including network services, web and client applications, Cloud penetration, penetration testing of wireless networks, and social engineering. Learners will explore several penetration tools, including Kali Linux, which comes with tool such as Nmap, Wireshark, and John the Ripper; the Aircrack suite; OpenVas, and several others. You will learn about web app security testing methodologies. Learners will observe the elements of a successful report, and how to document penetration testing results. Finally, this course demonstrates practicing testing skills by using Grier Demo website.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the importance of physical penetration testing and why organizations must perform penetration testing
    Describe the steps necessary to implement a physical penetration testing program and the phases of penetration testing
    Identify different lock pick tools and why lock picking is important in cybersecurity
    Describe how to protect sensitive data with security testing and the five penetration testing rules of engagement
    Describe penetration testing tools that are used by professional hackers
    Identify the types of penetration testing and common terminology
  • Describe electromagnetic security vulnerabilities and devices that can help prevent this method of attack
    Describe the purpose and results of dumpster diving and how to protect against this form of attack
    Identify how to recognize and prevent tailgating and recognize the risks that it exposes
    Describe how to document the findings of physical penetration testing and the key components of the report
    Identify web application security testing methodologies and the five stages of opsec
    Perform penetration testing using the gruyere demo web site
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 57s
  • 4m 12s
    Upon completion of this video, you will be able to describe the importance of physical penetration testing and why organizations must perform penetration testing. FREE ACCESS
  • Locked
    3.  Implementing a Physical Pen Testing Plan
    4m 22s
    After completing this video, you will be able to describe the steps necessary to implement a physical penetration testing program and the phases of penetration testing. FREE ACCESS
  • Locked
    4.  Pen Testing Lock Pick Tools
    4m 44s
    Find out how to identify different lock pick tools and why lock picking is important in cybersecurity. FREE ACCESS
  • Locked
    5.  Protecting Sensitive Data
    7m 1s
    After completing this video, you will be able to describe how to protect sensitive data with security testing and the five penetration testing rules of engagement. FREE ACCESS
  • Locked
    6.  Penetration Tools and Techniques
    8m 35s
    Upon completion of this video, you will be able to describe penetration testing tools that are used by professional hackers. FREE ACCESS
  • Locked
    7.  Penetration Testing Types
    5m 5s
    During this video, you will learn how to identify the types of penetration testing and common terminology. FREE ACCESS
  • Locked
    8.  Electromagnetic Security Vulnerabilities
    3m 18s
    Upon completion of this video, you will be able to describe electromagnetic security vulnerabilities and devices that can help prevent this type of attack. FREE ACCESS
  • Locked
    9.  Penetration Testing Dumpster Diving
    6m 2s
    Upon completion of this video, you will be able to describe the purpose and results of dumpster diving and how to protect against this form of attack. FREE ACCESS
  • Locked
    10.  Tailgating Security Risks
    3m 22s
    In this video, you will learn how to recognize and prevent tailgating, and how to recognize the risks that it exposes. FREE ACCESS
  • Locked
    11.  Physical Penetration Testing Report
    7m 7s
    Upon completion of this video, you will be able to describe how to document the findings of physical penetration testing and the key components of the report. FREE ACCESS
  • Locked
    12.  Web App Security Testing Methodologies
    5m 8s
    During this video, you will learn how to identify web application security testing methodologies and the five stages of OPSEC. FREE ACCESS
  • Locked
    13.  Web Site Penetration Test
    5m
    During this video, you will learn how to perform penetration testing using the Gruyere demo web site. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 29s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 35 users Rating 4.7 of 35 users (35)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.4 of 94 users Rating 4.4 of 94 users (94)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 20 users Rating 4.3 of 20 users (20)
Rating 4.7 of 67 users Rating 4.7 of 67 users (67)