Companies Home Search Profile

Penetration Testing Tools Online Training

Focused View

Bob Salmans

19:08:43

141 View
  • 1. Pentesting Reconnaissance.mp4
    05:16
  • 2. Pentesting Reconnaissance Tools.mp4
    09:09
  • 3. Domain Information Tools.mp4
    12:22
  • 4. IP and DNS Information Tools.mp4
    06:58
  • 5. Combination OSINT Tools.mp4
    08:29
  • 6. Breach Data Tools.mp4
    04:55
  • 7. Pentesting Reconnaissance Review.mp4
    02:49
  • 8. Intro to Pentesting Enumeration.mp4
    09:20
  • 9. Pentest Enumeration Tools.mp4
    09:35
  • 10. Basic NMAP Commands.mp4
    05:15
  • 11. Ping Scans with NMAP.mp4
    04:09
  • 12. Scanning TCP and UDP with NMAP.mp4
    05:55
  • 13. Identifying Host Attributes with NMAP.mp4
    08:12
  • 14. Using NMAP Scripts.mp4
    05:48
  • 15. Bypassing Firewalls with NMAP.mp4
    05:43
  • 16. Intro to Enumerating Services and Vulnerabilities.mp4
    02:05
  • 17. Enumerating with Port Scanners.mp4
    14:59
  • 18. Enumerating Web Servers.mp4
    12:22
  • 19. Enumerating SMB and Shares.mp4
    08:52
  • 20. Enumerating Vulnerabilities with Nessus.mp4
    16:25
  • 21. Automating Enumeration.mp4
    07:51
  • 22. Pentest Enumeration Review.mp4
    03:09
  • 23. Social Engineering Anatomy.mp4
    09:01
  • 24. Social Engineering Attacks.mp4
    07:41
  • 25. Social Engineering Tools.mp4
    08:20
  • 26. Social Engineering Toolkit.mp4
    15:35
  • 27. Using WifiPhisher.mp4
    03:40
  • 28. Pharming With ShellPhish.mp4
    05:33
  • 29. Social Engineering Review.mp4
    03:55
  • 30. Exploits and Payloads.mp4
    08:01
  • 31. Moving Files With PwnDrop.mp4
    11:41
  • 32. Transferring Files with SMB and SCP.mp4
    09:08
  • 33. Working With Exploits.mp4
    16:09
  • 34. Working With Payloads.mp4
    08:58
  • 35. Exploits and Payloads Review.mp4
    02:36
  • 36. Intro to the Metasploit Framework.mp4
    04:27
  • 37. Metasploit Startup and Workspaces.mp4
    06:53
  • 38. Metasploit Modules.mp4
    10:10
  • 39. Metasploit Options and Payloads.mp4
    09:54
  • 40. Managing Metasploit Sessions.mp4
    03:24
  • 41. Using Meterpreter.mp4
    09:46
  • 42. Metasploit Framework Review.mp4
    02:15
  • 43. Network Based Attacks and Tools.mp4
    11:26
  • 44. How Attacks Against ARP Work.mp4
    05:49
  • 45. ARP Poisoning Attack.mp4
    08:12
  • 46. How DNS Cache Poisoning Works.mp4
    02:56
  • 47. DNS Cache Poisoning Attack.mp4
    06:08
  • 48. VLAN Hopping Attacks.mp4
    04:26
  • 49. Bypassing Network Access Control.mp4
    05:29
  • 50. Network Based Attacks Review.mp4
    06:40
  • 51. Host Protocol Attacks and Tools Overview.mp4
    05:29
  • 52. Server Message Block (SMB) Protocol.mp4
    04:26
  • 53. Attacking the SMB Protocol.mp4
    13:09
  • 54. Simple Network Management Protocol (SNMP).mp4
    05:29
  • 55. Exploiting the SNMP Protocol.mp4
    13:08
  • 56. Denial of Service Attacks.mp4
    05:06
  • 57. Analyzing the LLMNR Protocol.mp4
    04:28
  • 58. Attacking the LLMNR Protocol.mp4
    06:19
  • 59. Host Protocol Attacks and Tools Review.mp4
    03:54
  • 60. Wireless and Mobile Device Attacks and Tools.mp4
    09:01
  • 61. Sniffing Wireless Data.mp4
    06:23
  • 62. Wireless Analysis With Kismet.mp4
    07:20
  • 63. Wireless Deauthentication Attacks.mp4
    03:57
  • 64. Cracking WPA2 Preshared Keys.mp4
    04:50
  • 65. Wireless Evil Twin Attack.mp4
    08:22
  • 66. Automated Wifi Attack Tools.mp4
    06:37
  • 67. Section Review.mp4
    04:22
  • 68. OWASP Top 10 (1 thru 3).mp4
    11:07
  • 69. OWASP Top 10 (4 thru 6).mp4
    07:34
  • 70. OWASP Top 10 (7 thru 10).mp4
    09:38
  • 71. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4
    04:31
  • 72. SQL Injection Attacks.mp4
    04:28
  • 73. File Inclusion Vulnerabilities.mp4
    08:08
  • 74. Additional Web App Vulnerabilities and Attacks.mp4
    06:28
  • 75. Web Application Pentesting.mp4
    03:43
  • 76. OWASP ZAP.mp4
    11:47
  • 77. Attack Scans Using OWASP ZAP.mp4
    05:01
  • 78. Brute Force Attack Using OWASP ZAP.mp4
    06:55
  • 79. SQL Injection Using SQLmap.mp4
    12:40
  • 80. Local and Remote File Inclusion Attacks.mp4
    08:14
  • 81. Cross Site Scripting (XSS) Attacks.mp4
    06:25
  • 82. Bind and Reverse Shells.mp4
    08:54
  • 83. The Power of Web Shells.mp4
    11:14
  • 84. Working With Bind and Reverse Shells.mp4
    07:16
  • 85. Shell One-Liners.mp4
    05:41
  • 86. Spawning Meterpreter Shells.mp4
    13:24
  • 87. Log Poisoning for a Shell.mp4
    06:17
  • 88. Windows Privilege Escalation Pt.1.mp4
    08:01
  • 89. Windows Privilege Escalation Pt.2.mp4
    06:45
  • 90. Getting a Windows Shell.mp4
    09:06
  • 91. Windows Local Host Enumeration.mp4
    09:06
  • 92. Windows Unquoted Service Path Vulnerability.mp4
    09:54
  • 93. Windows Local Exploit Privilege Escalation.mp4
    12:33
  • 94. Introduction to Privilege Escalation.mp4
    10:01
  • 95. Linux Privilege Escalation Pt.1.mp4
    07:06
  • 96. Linux Privilege Escalation Pt.2.mp4
    07:55
  • 97. Linux Shell Escalation.mp4
    06:40
  • 98. Linux Local Host Enumeration.mp4
    09:59
  • 99. Linux Privilege Escalation Via Cron Jobs.mp4
    09:20
  • 100. Linux SUID and SUDO privilege escalation.mp4
    08:10
  • 101. Linux Local Exploit Privilege Escalation.mp4
    11:44
  • 102. Physical Pentest Documents.mp4
    08:52
  • 103. Reconnaissance and Planning.mp4
    06:36
  • 104. Physical Pentest Tools.mp4
    14:26
  • 105. Getting Inside.mp4
    07:00
  • 106. Continuing From the Inside.mp4
    08:22
  • 107. Physical Pentest Report.mp4
    06:50
  • 108. Credential Attacks Pt.1.mp4
    07:13
  • 109Credential Attacks Pt.2.mp4
    09:40
  • 110. Creating Custom Wordlists.mp4
    12:43
  • 111. Performing a Brute Force Attack.mp4
    08:14
  • 112. Cracking Hashed Passwords.mp4
    11:26
  • 113. Executing a Pass the Hash Attack.mp4
    04:00
  • 114. Credential Harvesting and PrivEsc in the Cloud.mp4
    14:31
  • 115. Running PACU.mp4
    11:22
  • 116. Misconfigured Cloud Assets.mp4
    09:22
  • 117. Running CloudSploit.mp4
    07:44
  • 118. Resource Exhaustion, Malware Injection and API Attacks.mp4
    07:07
  • 119. Side Channel and Direct-To-Origin Attacks.mp4
    07:19
  • 120. Additional Cloud Pentesting Tools.mp4
    04:55
  • 121. Mobile Device Attacks.mp4
    05:13
  • 122. Mobile Device Vulnerabilities.mp4
    12:39
  • 123. Mobile Security Tools.mp4
    06:00
  • 124. Internet of Things (IoT) Devices.mp4
    08:03
  • 125. Data Storage System Vulnerabilities.mp4
    08:44
  • 126. SCADA, IIoT and ICS Vulnerabilities.mp4
    05:30
  • 127. Virtual Environment Vulnerabilities.mp4
    06:08
  • 128. Establishing Persistence.mp4
    05:09
  • 129. Lateral Movement.mp4
    09:17
  • 130. Data Exfiltration.mp4
    07:04
  • 131. Covering Your Tracks.mp4
    06:19
  • 132. Linux Post Exploit Activities.mp4
    10:43
  • 133. Windows Post Exploit Activities.mp4
    10:59
  • 134. Analyze a Basic Script.mp4
    05:43
  • 135. Scripting Basics.mp4
    09:01
  • 136. Assigning Values to Variables.mp4
    08:31
  • 137. Operating on Variables with Operators.mp4
    07:00
  • 138. Branching Code with Conditionals.mp4
    09:12
  • 139. Reapeating Code with Loops.mp4
    11:21
  • 140. Handling Errors in Code.mp4
    07:15
  • 141. Intro.mp4
    01:16
  • 142. Analyzing PING Scripts.mp4
    14:54
  • 143. Downloading Files with Scripts.mp4
    04:41
  • 144. Automation with Scripts.mp4
    11:15
  • 145. Updating IP Settings with a Script.mp4
    06:24
  • 146. NMAP Reports in HTML.mp4
    06:44
  • Description


    This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target's vulnerabilities. This training is also associated with the CompTIA PenTest+ certification.

    In the world of network and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they're not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated.

    More details


    This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.

    For anyone who leads a technology team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource.

    Penetration Testing Tools: What You Need to Know

    This Penetration Testing Tools training has videos that cover topics such as:

    • Identifying vulnerabilities and building a plan of attack
    • Exploiting targets revealed in scans and attacking devices
    • Deploying industry pentest tools like Kali, network mappers, password crackers, and more

    Who Should Take Penetration Testing Tools Training?

    This Penetration Testing Tools training is considered foundational-level CompTIA training, which means it was designed for security technicians. This pentration testing skills course is valuable for new IT professionals with at least a year of experience with penetration testing tools and experienced security technicians looking to validate their CompTIA skills.

    New or aspiring security technicians. For brand new security technicians, this Penetration Testing Tools training might be slightly specialized -- there are fundamentals about network security that will provide a better foundation for a career at the very outset. However, learning how to use the tools used in penetration tests can make you a better network security operator and can eventually lead to getting placed on pentest teams -- prepare for that eventuality with this training.

    Experienced security technicians. If you've been working as a security technician for several years and you've been itching to advance in your career into doing penetration tests, this training will familiarize you with the tools that make them happen. Some are open source, others are paid products, but knowing the tools that support penetration testing can prepare you for the more advanced work of pentests and secure your place on those teams.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 146
    • duration 19:08:43
    • Release Date 2023/07/16