Companies Home Search Profile

Penetration Testing Essential Training

Focused View

Malcolm Shore

2:38:32

0 View
  • [1] Build a foundation in penetration testing.mp4
    00:50
  • [2] What you need to know.mp4
    00:41
  • [3] Disclaimer.mp4
    01:08
  • [1] Pen testing overview.mp4
    08:44
  • [2] The cyber kill chain.mp4
    07:01
  • [3] The MITRE ATT&CK repository.mp4
    01:57
  • [1] Scan networks with Nmap.mp4
    04:33
  • [2] A Netcat refresher.mp4
    04:56
  • [3] Capture packets with tcpdump.mp4
    04:59
  • [4] Work with netstat, nbtstat, and arp.mp4
    02:28
  • [5] Script with PowerShell.mp4
    06:09
  • [6] Extend PowerShell with Nishang.mp4
    05:08
  • [1] Refresh your Bash skills.mp4
    02:29
  • [2] Control the flow in a script.mp4
    01:59
  • [3] Use functions in Bash.mp4
    01:19
  • [1] Refresh your Python skills.mp4
    08:34
  • [2] Use the system functions.mp4
    01:47
  • [3] Use networking functions.mp4
    01:47
  • [4] Work with websites.mp4
    03:48
  • [5] Drive Metasploit through Python.mp4
    02:21
  • [6] Access SQLite databases.mp4
    01:51
  • [7] Use Scapy to work with packets.mp4
    00:53
  • [1] A Kali refresher.mp4
    03:21
  • [2] Fuzzing with Spike.mp4
    03:14
  • [3] Information gathering with Legion.mp4
    02:29
  • [4] Using Metasploit.mp4
    05:34
  • [5] Exploit with Armitage.mp4
    08:44
  • [6] Scan targets with GVM.mp4
    04:41
  • [7] Managing GVM problems.mp4
    02:00
  • [1] Approach web testing.mp4
    03:31
  • [2] Test websites with Burp Suite.mp4
    03:33
  • [3] Check web servers with Nikto.mp4
    01:01
  • [4] Fingerprint web servers.mp4
    04:44
  • [5] Web server penetration using sqlmap.mp4
    05:16
  • [1] Exploit a target.mp4
    08:03
  • [2] Understand code injection.mp4
    14:08
  • [3] Understand buffer overflows.mp4
    08:39
  • [4] Find exploit code.mp4
    02:44
  • [1] Next steps.mp4
    01:28
  • Description


    Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization.

    Cybersecurity expert Malcolm Shore reviews and demonstrates the popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and reuse exploit code. He also provides a refresher on the Kali Linux penetration testing toolbox, approaches to web testing, and several important facets of exploit code. At the end of this course, you'll be prepared to take more advanced training and to pursue the popular Offensive Security Certified Professional (OSCP) certification.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 39
    • duration 2:38:32
    • English subtitles has
    • Release Date 2025/02/09

    Courses related to Ethical Hacking