PenTesting for Physical Security
IT Security
| Intermediate
- 14 videos | 1h 7m 22s
- Includes Assessment
- Earns a Badge
This 14-video course explores physical penetration testing, and how to test a business's infrastructure, including IT assets, its data, people, and physical security to locate any exploitable vulnerabilities. In this course, you will learn why lockpicking is essential in cybersecurity, and you will examine different types of locks and lockpick tools. This course demonstrates several types of penetrations, including EM (electromagnetic security vulnerabilities), dumpster diving, and tailgating, and how to protect against these attacks. You will learn about penetration testing types, including network services, web and client applications, Cloud penetration, penetration testing of wireless networks, and social engineering. Learners will explore several penetration tools, including Kali Linux, which comes with tool such as Nmap, Wireshark, and John the Ripper; the Aircrack suite; OpenVas, and several others. You will learn about web app security testing methodologies. Learners will observe the elements of a successful report, and how to document penetration testing results. Finally, this course demonstrates practicing testing skills by using Grier Demo website.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the importance of physical penetration testing and why organizations must perform penetration testingDescribe the steps necessary to implement a physical penetration testing program and the phases of penetration testingIdentify different lock pick tools and why lock picking is important in cybersecurityDescribe how to protect sensitive data with security testing and the five penetration testing rules of engagementDescribe penetration testing tools that are used by professional hackersIdentify the types of penetration testing and common terminology
-
Describe electromagnetic security vulnerabilities and devices that can help prevent this method of attackDescribe the purpose and results of dumpster diving and how to protect against this form of attackIdentify how to recognize and prevent tailgating and recognize the risks that it exposesDescribe how to document the findings of physical penetration testing and the key components of the reportIdentify web application security testing methodologies and the five stages of opsecPerform penetration testing using the gruyere demo web siteSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 57s
-
4m 12sUpon completion of this video, you will be able to describe the importance of physical penetration testing and why organizations must perform penetration testing. FREE ACCESS
-
4m 22sAfter completing this video, you will be able to describe the steps necessary to implement a physical penetration testing program and the phases of penetration testing. FREE ACCESS
-
4m 44sFind out how to identify different lock pick tools and why lock picking is important in cybersecurity. FREE ACCESS
-
7m 1sAfter completing this video, you will be able to describe how to protect sensitive data with security testing and the five penetration testing rules of engagement. FREE ACCESS
-
8m 35sUpon completion of this video, you will be able to describe penetration testing tools that are used by professional hackers. FREE ACCESS
-
5m 5sDuring this video, you will learn how to identify the types of penetration testing and common terminology. FREE ACCESS
-
3m 18sUpon completion of this video, you will be able to describe electromagnetic security vulnerabilities and devices that can help prevent this type of attack. FREE ACCESS
-
6m 2sUpon completion of this video, you will be able to describe the purpose and results of dumpster diving and how to protect against this form of attack. FREE ACCESS
-
3m 22sIn this video, you will learn how to recognize and prevent tailgating, and how to recognize the risks that it exposes. FREE ACCESS
-
7m 7sUpon completion of this video, you will be able to describe how to document the findings of physical penetration testing and the key components of the report. FREE ACCESS
-
5m 8sDuring this video, you will learn how to identify web application security testing methodologies and the five stages of OPSEC. FREE ACCESS
-
5mDuring this video, you will learn how to perform penetration testing using the Gruyere demo web site. FREE ACCESS
-
1m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
Rating 4.7 of 25 users
(25)