Join Malcolm Shore for an in-depth discussion in this video Course disclaimer, part of Penetration Testing Essential Training.
- [Instructor] This course uses a range of third-party testing tools. Some are commercial products and some are open-source. The download and installation instructions for all tools used in this course is available as a PDF in the associated course material. While we've done our best to ensure that the tools we use and the sites we reference are legitimate, testing sites can be targets for hackers. And we can't provide assurance that these sites might not have been compromised when you visit them. Some of the sites which store the testing tools are detected as dangerous, because the tools have similar signatures to malware and may raise anti-virus alerts when you visit them.
The testing tools we demonstrate are extremely powerful. They may demonstrate some of the same signature characteristics as malware and malicious implants and may raise anti-virus alerts when you try to download them. Again, we can't provide assurance that the software hasn't been compromised when you download it. And so, as for any other software from the Internet, you need to exercise due diligence and take personal responsibility for anything you load into your system.
Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on Kali Linux and introduces techniques for testing web services. At the end of this course, you'll be prepared to take more advanced training, and to pursue the popular Offensive Security Certified Professional (OSCP) certification.
- Pen testing overview
- Pen testing tools
- Bash scripting
- Python scripting
- Kali and Metasploit
- Web testing
- Finding exploit code
Skill Level Intermediate
Ethical Hacking: Penetration Testingwith Lisa Bock1h 21m Intermediate
1. What is Pen Testing?
2. Pen Testing Tools
3. Bash Scripting
4. Python Scripting
5. Kali and Metasploit
6. Web Testing
7. Understanding Exploit code
What's next1m 27s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.