Penetration Testing Unveiled: Ethical Hacking & Pentesting
Penetration Testing Unveiled: Ethical Hacking & Pentesting, available at $54.99, has an average rating of 4.55, with 44 lectures, 6 quizzes, based on 148 reviews, and has 35216 subscribers.
You will learn about Learn the motives and mindset of an attacker Carry out the penetration testing methodology like a professional Explore methods to attack devices and servers Investigate the process of attacking the client side of the network Explore penetration testing Experience the process of identifying weaknesses and then attacking them Learn techniques to penetrate perimeter devices Explore the challenge of defeating enterprise defenses Practice a multitude of evasion tactics Perform penetration testing by using client side tactics Compete against a live progressive target range Enhance your professional security testing skills Develop a roadmap to becoming a professional penetration tester This course is ideal for individuals who are Everyone It is particularly useful for Everyone.
Enroll now: Penetration Testing Unveiled: Ethical Hacking & Pentesting
Summary
Title: Penetration Testing Unveiled: Ethical Hacking & Pentesting
Price: $54.99
Average Rating: 4.55
Number of Lectures: 44
Number of Quizzes: 6
Number of Published Lectures: 44
Number of Published Quizzes: 6
Number of Curriculum Items: 50
Number of Published Curriculum Objects: 50
Original Price: $64.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn the motives and mindset of an attacker
- Carry out the penetration testing methodology like a professional
- Explore methods to attack devices and servers
- Investigate the process of attacking the client side of the network
- Explore penetration testing
- Experience the process of identifying weaknesses and then attacking them
- Learn techniques to penetrate perimeter devices
- Explore the challenge of defeating enterprise defenses
- Practice a multitude of evasion tactics
- Perform penetration testing by using client side tactics
- Compete against a live progressive target range
- Enhance your professional security testing skills
- Develop a roadmap to becoming a professional penetration tester
Who Should Attend
- Everyone
Target Audiences
- Everyone
To effectively secure the networks of today requires the establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
In this course you learn how to conduct a pentest and what cybersecurity is all about. You will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing.
You will build the skills and apply techniques to penetrate devices, servers, and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skill sets increase.
By the time you leave the course, you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once.
Your instructor, Kevin Cardwell, is a former senior U.S. Navy cybersecurity expert and the author of multiple books on cybersecurity.
More about this course and Starweaver
This course is led by a seasoned technology industry practitioner and executive, with many years of hands-on, in-the-trenches cybersecurity work. It has been designed, produced and delivered by Starweaver. Starweaver is one of the most highly regarded, well-established training providers in the world, providing training courses to many of the leading financial institutions and technology companies, including:
Ahli United Bank; Mashreqbank; American Express; ANZ Bank; ATT; Banco Votorantim; Bank of America; Bank of America Global Markets; Bank of America Private Bank; Barclay Bank; BMO Financial Group; BMO Financial Services; BNP Paribas; Boeing; Cigna; Citibank; Cognizant; Commerzbank; Credit Lyonnais/Calyon; Electrosonic; Farm Credit Administration; Fifth Third Bank; GENPACT; GEP Software; GLG Group; Hartford; HCL; HCL; Helaba; HSBC; HSBC Corporate Bank; HSBC India; HSBC Private Bank; Legal & General; National Australia Bank; Nomura Securities; PNC Financial Services Group; Quintiles; RAK Bank; Regions Bank; Royal Bank of Canada; Royal Bank of Scotland; Santander Corporate Bank; Tata Consultancy Services; Union Bank; ValueMomentum; Wells Fargo; Wells Fargo India Solutions; Westpac Corporate Bank; Wipro; and, many others.
Starweaver has and continues to deliver 1000s of live in-person and online education for organizational training programs for new hires and induction, as well as mid-career and senior-level immersion and leadership courses.
If you are looking for live streaming education or want to understand what courses might be best for you in technology or business, just google:
Starweaver journey builder starweaver[dot]com
Happy learning.
Course Curriculum
Chapter 1: Module One
Lecture 1: Welcome!
Lecture 2: Building the Cyber Range
Lecture 3: Multiple Layers and Switches
Lecture 4: Customizing IP Addresses
Lecture 5: Finding and Building Your Own Machine
Lecture 6: Building and Advanced Range
Chapter 2: Module Two
Lecture 1: The Process of Penetration Testing
Chapter 3: Module Three
Lecture 1: The Abstract Methodology
Lecture 2: Planning
Lecture 3: Intrusive Target Search and Scanning Methodology
Lecture 4: Network Mapping and Nmap
Lecture 5: Understanding Open Ports
Lecture 6: Services Running on Ports
Lecture 7: Enumeration
Chapter 4: Module Four
Lecture 1: Identification of Vulnerabilities Manual
Lecture 2: Identification of Vulnerabilities Manual Dups
Lecture 3: Openvas
Chapter 5: Module Five
Lecture 1: Validation of Vulnerabilities
Lecture 2: Exploit Tools and Distributions
Chapter 6: Module Six
Lecture 1: Data Analysis Review
Lecture 2: Reporting and Showcasing Results
Chapter 7: Labs Module One
Lecture 1: Lab 01 – Part 01 Setting Up a Flat Network
Lecture 2: Lab 01 – Part 02 – Understanding Virtual Box
Lecture 3: Lab 01 – Part 03 – VM Workstation Player
Lecture 4: Lab 02 – Part 01 – Setting Up Multiple Layer
Lecture 5: Lab 02 – Part 02 – Virtual Box
Lecture 6: Lab 02 – Part 03 – VMware Player Methods
Lecture 7: Lab 03 – Customizing Your IP Addresses
Lecture 8: Lab 04 – Building Your Own Machine Kioptrix
Lecture 9: Lab 05 – Setting Up The Advanced Range
Chapter 8: Labs Module Two
Lecture 1: Lab 01 – Instrusive Target Search
Lecture 2: Lab 02 – Scanning Live Systems
Lecture 3: Lab 03 – Ports
Lecture 4: Lab 04 – Services Scan
Lecture 5: Lab 05 – Enumeration
Chapter 9: Labs Module Three
Lecture 1: Lab 01 – Vulnerability Sites
Lecture 2: Lab 02 – Using Nmap
Lecture 3: Lab 03 – Exploring Openvas
Lecture 4: Lab 04 – Exploring Nessus
Lecture 5: Lab 05 – Exploring Nikto
Chapter 10: Labs Module Four
Lecture 1: Lab 01 – Exploitdb
Lecture 2: Lab 02 – Exploitdb Dups
Lecture 3: Lab 03 – Tcpdump Data Analysis
Chapter 11: Closing Remarks
Lecture 1: Take-aways
Instructors
-
Starweaver Instructor Team
Learning | Doing | Connecting® -
Kevin Cardwell
Computer Security Architect -
Paul Siegel
Top rated instructor and course creator
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 3 votes
- 3 stars: 16 votes
- 4 stars: 47 votes
- 5 stars: 82 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024