Companies Home Search Profile

Ethical Hacking: Penetration Testing

Focused View

Dale Meredith

4:42:41

14 View
  • 01 - Understanding Penetration Testing.mp4
    04:07
  • 02 - Why Do Penetration Tests.mp4
    08:25
  • 03 - Types of Pen Tests.mp4
    04:00
  • 04 - Stage 1 - Pre-attack.mp4
    16:03
  • 05 - Stage 2 - Attack.mp4
    06:37
  • 06 - Stage 3 - Post-attack.mp4
    01:45
  • 07 - Pen Testing Standards.mp4
    16:49
  • 08 - Summary.mp4
    03:10
  • 09 - Laying the Foundation.mp4
    01:19
  • 10 - The Steps to a Successful Pen Test.mp4
    06:18
  • 11 - Summary.mp4
    00:51
  • 12 - Intro to Scanning the Target.mp4
    01:57
  • 13 - Steps to Scan the Target.mp4
    06:04
  • 14 - Summary.mp4
    00:50
  • 15 - Intro to Enumerating the Target.mp4
    01:46
  • 16 - Steps to Enumerate the Target.mp4
    07:23
  • 17 - Summary.mp4
    05:11
  • 18 - Intro to Hacking the Target.mp4
    03:17
  • 19 - Password Cracking.mp4
    10:05
  • 20 - Privilege Escalation.mp4
    02:13
  • 21 - Service Accounts.mp4
    02:08
  • 22 - Hide And Seek Time.mp4
    03:32
  • 23 - Covering Our Tracks.mp4
    01:31
  • 24 - Summary.mp4
    02:27
  • 25 - Intro to Sniffing the Target .mp4
    01:49
  • 26 - Flooding, Spoofing, And Poisoning.mp4
    05:30
  • 27 - Summary.mp4
    01:56
  • 28 - Intro to Social Engineering.mp4
    04:32
  • 29 - Reconnaissance And Creating the Scenario.mp4
    04:13
  • 30 - Attacking.mp4
    06:15
  • 31 - Summary.mp4
    01:45
  • 32 - Intro to DoS DDoS the Target.mp4
    03:08
  • 33 - Outline Objectives.mp4
    00:55
  • 34 - Load up the Server.mp4
    02:16
  • 35 - Look for Vulnerabilities And Flooding.mp4
    01:33
  • 36 - Email-bombing And Flood Web-forms.mp4
    01:49
  • 37 - Summary.mp4
    02:41
  • 38 - Intro to Session Hijacking the Target.mp4
    02:53
  • 39 - Steps to Test for Session Hijacking.mp4
    05:30
  • 40 - Summary.mp4
    01:41
  • 41 - Intro to Targeting Web Servers.mp4
    03:25
  • 42 - Recon Your Targets.mp4
    04:11
  • 43 - More In-depth Recon.mp4
    03:55
  • 44 - Summary.mp4
    01:50
  • 45 - Intro to Hitting the Web Apps.mp4
    03:32
  • 46 - Define Targets And Gather Information.mp4
    03:35
  • 47 - Configuration Management Testing.mp4
    02:10
  • 48 - Authentication Testing.mp4
    02:17
  • 49 - Session Management Testing.mp4
    01:48
  • 50 - Authorization Testing.mp4
    01:09
  • 51 - Data Validation Testing.mp4
    03:46
  • 52 - Denial of Service Testing.mp4
    02:23
  • 53 - Web Services Testing.mp4
    03:31
  • 54 - AJAX Testing.mp4
    02:18
  • 55 - Summary.mp4
    03:20
  • 56 - Intro to Looking at the Wi-Fi.mp4
    02:30
  • 57 - Whos Out There!.mp4
    01:25
  • 58 - WEP Testing.mp4
    01:06
  • 59 - WPA WPA2 Testing.mp4
    02:08
  • 60 - General Wi-Fi Testing.mp4
    02:07
  • 61 - Summary.mp4
    01:53
  • 62 - Intro to Focusing on the Mobile Devices.mp4
    03:15
  • 63 - Android Pen Testing.mp4
    04:24
  • 64 - iPhone Pen Testing.mp4
    03:25
  • 65 - Windows Phone Pen Testing.mp4
    02:40
  • 66 - BlackBerry Pen Testing.mp4
    04:15
  • 67 - Summary.mp4
    01:55
  • 68 - Intro to Target the Firewall and or IDS.mp4
    02:33
  • 69 - Firewall Testing.mp4
    04:02
  • 70 - IDS Testing.mp4
    08:48
  • 71 - Summary.mp4
    01:19
  • 72 - Intro to Going After the Cloud.mp4
    02:09
  • 73 - Its Not All About You - Before You Begin.mp4
    03:29
  • 74 - Its Not All About You - The Steps.mp4
    06:35
  • 75 - Summary.mp4
    01:28
  • 76 - Intro to How to Bring It All Together.mp4
    01:51
  • 77 - Whats in the Report.mp4
    08:01
  • 78 - Summary.mp4
    01:59
  • Description


    Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.

    What You'll Learn?


      What's penetration testing?
      Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems.
      Remember, you can't stop attackers, your job is to slow them down.
      How?
      Let's start by doing exactly what the attacker will do.

      Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would.

      The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage.

      In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 78
    • duration 4:42:41
    • level preliminary
    • Release Date 2023/12/05

    Courses related to Ethical Hacking

    Courses related to Penetration Testing