Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Penetration Testing Essentials

(pen-test) / ISBN: 978-1-61691-015-0
This course includes
Lessons
TestPrep
Mentoring (Add-on)
pen-test : Penetration Testing Essentials
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Penetration Testing Essentials

Master the concepts of IT penetration testing with the Penetration Testing Essentials course. The Penetration Testing Training offers an understanding of topics such as scanning and enumeration, intelligence gathering, cracking password, cryptography, reporting, retaining access with backdoors and malware, working with defensive and detecting sections, and many more. This penetration testing course will help you learn about the various ethical hacking methods currently being used on the front lines.
Here's what you will get

Lessons
  • 20+ Lessons
  • 124+ Quizzes
  • 94+ Flashcards
  • 94+ Glossary of terms
TestPrep
  • 50+ Pre Assessment Questions
  • 1+ Full Length Tests
  • 50+ Post Assessment Questions
  • 50+ Practice Test Questions
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
Lesson 2: Introduction to Penetration Testing
  • Defining Penetration Testing
  • Preserving Confidentiality, Integrity, and Availability
  • Appreciating the Evolution of Hacking
Lesson 3: Introduction to Operating Systems and Networking
  • Comparing Common Operating Systems
  • Exploring Networking Concepts
Lesson 4: Introduction to Cryptography
  • Recognizing the Four Goals of Cryptography
  • The History of Encryption
  • Speaking Intelligently About Cryptography
  • Comparing Symmetric and Asymmetric Cryptography
  • Transforming Data via Hashing
  • A Hybrid System: Using Digital Signatures
  • Working with PKI
Lesson 5: Outlining the Pen Testing Methodology
  • Determining the Objective and Scope of the Job
  • Choosing the Type of Test to Perform
  • Gaining Permission via a Contract
  • Following the Law While Testing
Lesson 6: Gathering Intelligence
  • Introduction to Intelligence Gathering
  • Examining a Company's Web Presence
  • Finding Websites That Don't Exist Anymore
  • Gathering Information with Search Engines
  • Targeting Employees with People Searches
  • Discovering Location
  • Do Some Social Networking
  • Looking via Financial Services
  • Investigating Job Boards
  • Searching Email
  • Extracting Technical Information
Lesson 7: Scanning and Enumeration
  • Introduction to Scanning
  • Checking for Live Systems
  • Performing Port Scanning
  • Identifying an Operating System
  • Scanning for Vulnerabilities
  • Using Proxies (Or Keeping Your Head Down)
  • Performing Enumeration
Lesson 8: Conducting Vulnerability Scanning
  • Introduction to Vulnerability Scanning
  • Recognizing the Limitations of Vulnerability Scanning
  • Outlining the Vulnerability Scanning Process
  • Types of Scans That Can Be Performed
Lesson 9: Cracking Passwords
  • Recognizing Strong Passwords
  • Choosing a Password-Cracking Technique
  • Executing a Passive Online Attack
  • Executing an Active Online Attack
  • Executing an Offline Attack
  • Using Nontechnical Methods
  • Escalating Privileges
Lesson 10: Retaining Access with Backdoors and Malware
  • Deciding How to Attack
  • Installing a Backdoor with PsTools
  • Opening a Shell with LAN Turtle
  • Recognizing Types of Malware
  • Launching Viruses
  • Launching Worms
  • Launching Spyware
  • Inserting Trojans
  • Installing Rootkits
Lesson 11: Reporting
  • Reporting the Test Parameters
  • Collecting Information
  • Highlighting the Important Information
  • Adding Supporting Documentation
  • Conducting Quality Assurance
Lesson 12: Working with Defensive and Detection Systems
  • Detecting Intrusions
  • Recognizing the Signs of an Intrusion
  • Evading an IDS
  • Breaching a Firewall
  • Using Honeypots: The Wolf in Sheep's Clothing
Lesson 13: Covering Your Tracks and Evading Detection
  • Recognizing the Motivations for Evasion
  • Getting Rid of Log Files
  • Hiding Files
  • Evading Antivirus Software
  • Evading Defenses by Entering Through a Backdoor
  • Using Rootkits for Evasion
Lesson 14: Detecting and Targeting Wireless
  • An Introduction to Wireless
  • Breaking Wireless Encryption Technologies
  • Conducting a Wardriving Attack
  • Conducting Other Types of Attack
  • Choosing Tools to Attack Wireless
  • Knocking Out Bluetooth
  • Hacking the Internet of Things (IoT)
Lesson 15: Dealing with Mobile Device Security
  • Recognizing Current-Generation Mobile Devices
  • Working with Android OS
  • Working with Apple iOS
  • Finding Security Holes in Mobile Devices
  • Encountering Bring Your Own Device (BYOD)
  • Choosing Tools to Test Mobile Devices
Lesson 16: Performing Social Engineering
  • Introduction to Social Engineering
  • Exploiting Human Traits
  • Acting Like a Social Engineer
  • Targeting Specific Victims
  • Leveraging Social Networking
  • Conducting Safer Social Networking
Lesson 17: Hardening a Host System
  • Introduction to Hardening
  • Three Tenets of Defense
  • Creating a Security Baseline
  • Hardening with Group Policy
  • Hardening Desktop Security
  • Backing Up a System
Lesson 18: Hardening Your Network
  • Introduction to Network Hardening
  • Intrusion Detection Systems
  • Firewalls
  • Physical Security Controls
Lesson 19: Navigating the Path to Job Success
  • Choosing Your Career Path
  • Build a Library
  • Practice Technical Writing
  • Display Your Skills
Lesson 20: Building a Test Lab for Penetration Testing
  • Deciding to Build a Lab
  • Considering Virtualization
  • Getting Starting and What You Will Need
  • Installing Software
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept