Penetration Testing Fundamentals
Know everything about IT penetration testing with the Penetration Testing Fundamentals course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The course and lab cover all the concepts, terminology, and challenges in Metasploit, provide skills required to write or customize sophisticated Metasploit exploits, general hacking techniques and knowledge, and some additional penetration testing concepts.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
100+ Pre Assessment Questions |
100+ Post Assessment Questions |
Features
57+ LiveLab |
00+ Minutes
109+ Videos |
12:10+ Hours
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction to Penetration Testing
- What Is Penetration Testing?
- Terminology
- Methodologies
- Ethical Issues
- Legal Issues
- Certifications
- Careers in Penetration Testing
- Building Your Skillset
- Summary
- Test Your Skills
Lessons 2:
Standards
- PCI DSS
- NIST 800-115
- National Security Agency InfoSec Assessment Methodology (NSA-IAM)
- PTES
- CREST (UK)
- A Synthesis (Putting Standards Together into a Single Unified Approach)
- Related Standards
- Other Standards
- Summary
- Test Your Skills
Lessons 3:
Cryptography
- Cryptography Basics
- History of Encryption
- Modern Methods
- Public Key (Asymmetric) Encryption
- Digital Signatures
- Hashing
- MAC and HMAC
- Password Crackers
- Steganography
- Cryptanalysis
- Learning More
- Summary
- Test Your Skills
Lessons 4:
Reconnaissance
- Passive Scanning Techniques
- Active Scanning Techniques
- Wireshark
- Maltego
- Other OSINT Tools
- Summary
- Test Your Skills
Lessons 5:
Malware
- Viruses
- Trojan Horses
- Other Forms of Malware
- Creating Malware
- Summary
- Test Your Skills
Lessons 6:
Hacking Windows
- Windows Details
- Windows Password Hashing
- Windows Hacking Techniques
- Windows Scripting
- Windows Password Cracking
- Detecting Malware in Windows
- Cain and Abel
- Summary
- Test Your Skills
Lessons 7:
Web Hacking
- Web Technology
- Specific Attacks on Websites
- Tools
- Summary
- Test Your Skills
Lessons 8:
Vulnerability Scanning
- Vulnerabilities
- Packet Capture
- Network Scanners
- Wireless Scanners/Crackers
- General Scanners
- Web Application Scanners
- Cyber Threat Intelligence
- Summary
- Test Your Skills
Lessons 9:
Introduction to Linux
- Linux History
- Linux Commands
- Directories
- Graphical User Interface
- Summary
- Test Your Skills
Lessons 10:
Linux Hacking
- More on the Linux OS
- Linux Firewall
- Syslogd
- Scripting
- Linux Passwords
- Linux Hacking Tricks
- Summary
- Test Your Skills
Lessons 11:
Introduction to Kali Linux
- Kali Linux History
- Kali Basics
- Kali Tools
- Summary
- Test Your Skills
Lessons 12:
General Hacking Techniques
- Wi-Fi Testing
- Social Engineering
- DoS
- Summary
- Test Your Skills
Lessons 13:
Introduction to Metasploit
- Background on Metasploit
- Getting Started with Metasploit
- Basic Usage of msfconsole
- Scanning with Metasploit
- How to Use Exploits
- Exploit Examples
- Post Exploits
- Summary
- Test Your Skills