From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Conduct penetration tests
From the course: Performing a Technical Security Audit and Assessment
Conduct penetration tests
- I've been referring to penetration testing quite a bit throughout the course. Let's get down to what it is and how we can use it. Penetration testing validates target vulnerabilities by attempting to exploit those vulnerabilities and gain unauthorized access. Penetration tests, which are sometimes called Pen Tests, or ethical hacking, build on the information gathered during the discovery and vulnerability scanning stages. Pen tests are an important part of the security assessment, because they are the ultimate demonstration of existing security weaknesses. They simulate how an actual attacker would identify and possibly exploit vulnerabilities. Pen Tests typically follow a four-stage methodology. Gather data/planning, Discovery/vulnerability analysis, Attempt exploits, and Reporting/remediation. The Gather Data and Planning stage aligns closely with the technical security assessment reviews, and planning technical security assessments chapters in this course. This is where an…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Required skillsets1m 43s
-
(Locked)
Crack passwords3m 15s
-
(Locked)
Challenge: Install and run a password cracker1m 26s
-
(Locked)
Solution: Install and run a password cracker2m 46s
-
(Locked)
Password cracking tool demo5m 19s
-
(Locked)
Conduct penetration tests4m 7s
-
(Locked)
Penetration testing tool demo3m 55s
-
(Locked)
Conduct social engineering1m 29s
-
(Locked)
-
-
-
-