Companies Home Search Profile

Pentesting Fundamentals for Beginners

Focused View

Cliff Krahenbill

7:30:27

142 View
  • 00001 Course Overview.mp4
    01:57
  • 00002 Create a Virtual Install of Kali Linux.mp4
    12:11
  • 00003 Create a Virtual Install of Windows 10.mp4
    15:41
  • 00004 Create a Virtual Install of Metasploitable2 Using VirtualBox.mp4
    10:01
  • 00005 Create a Virtual Install of Metasploitable3 Using VirtualBox.mp4
    07:32
  • 00006 Create a Virtual Install of OWASP.mp4
    05:46
  • 00007 Taking a Snapshot of Your Current Configuration.mp4
    04:13
  • 00008 Scoping the Engagement.mp4
    05:15
  • 00009 Statement of Work SOW Document.mp4
    06:43
  • 00010 Rules of Engagement ROE Document.mp4
    08:39
  • 00011 Master Service Agreement MSA NDA.mp4
    02:01
  • 00012 Pentesting Final Report.mp4
    09:18
  • 00013 Overview of MITRE ATT CK Framework.mp4
    03:18
  • 00014 Overview of the NIST Pentesting Framework.mp4
    02:45
  • 00015 Overview of the Penetration Testing Execution Standard PTES.mp4
    03:54
  • 00016 Introduction to Nmap.mp4
    16:35
  • 00017 Nmap Service and Open Port Scan.mp4
    04:41
  • 00018 Nmap OS Detection.mp4
    08:44
  • 00019 Nmap Service and Version Detection.mp4
    04:38
  • 00020 Nmap Host Discovery.mp4
    08:41
  • 00021 Nmap Scripting Engine NSE.mp4
    18:35
  • 00022 Analyzing Nmap Results.mp4
    08:46
  • 00023 Perform a Vulnerability Scan Using OpenVAS.mp4
    15:01
  • 00024 Using Banner Grabbing to Aid in Reconnaissance.mp4
    09:58
  • 00025 Enumerating Windows 10 Using WinPEAS.mp4
    12:09
  • 00026 Creating a Persistent Backdoor Using Service Persistence.mp4
    14:09
  • 00027 Create a Windows Reverse Shell Using PowerShell.mp4
    08:44
  • 00028 Launch a Graphic Console Window Using SSH and XTERM.mp4.mp4
    05:16
  • 00029 Window 7 10 Privilege Escalation Using UAC Bypass.mp4
    05:10
  • 00030 Verify Windows Privilege Escalation - Unquoted Service Path.mp4
    15:40
  • 00031 Windows Privilege Escalation Unquoted Service Path.mp4
    17:36
  • 00032 Overview of OWASP Top 10.mp4
    09:22
  • 00033 Assemble Fake TCPIP Packets Using Hping3.mp4
    06:37
  • 00034 Identify Active Network Hosts and Services Using Nmap.mp4
    12:42
  • 00035 Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4
    06:04
  • 00036 Configuring BurpSuite as a Proxy.pdf.mp4
    08:55
  • 00037 Web Application Firewall Detection Using WAFW00F.mp4
    04:45
  • 00038 Perform a SQL Injection Attack Using SQLmap.mp4
    11:59
  • 00039 Exploit Vulnerable Web Applications Using Command Injection.mp4
    09:18
  • 00040 Exploiting HTTP PUT Method.mp4
    12:45
  • 00041 Brute Forcing WordPress Password.mp4
    15:21
  • 00042 Compiling Exploit Code for Linux Using GCC.mp4
    14:26
  • 00043 Prepare a Windows OVA file for your Virtual Lab Environment.mp4
    13:58
  • 00044 Cross Compiling Windows Exploits Using Mingw-w64.mp4
    11:30
  • 00045 Local File Inclusion Using Kali Web Shells PHP Scripts.mp4
    14:01
  • 00046 File Transfer Using HTTP and PowerShell s WebClient Object.mp4
    04:42
  • 00047 Python3 SimpleHTTPServer.mp4
    09:25
  • 00048 String Slicing Using Python.mp4
    08:19
  • 00049 Disable Windows 10 UAC Using PowerShell.mp4
    02:41
  • Pentesting-Fundamentals-for-Beginners-main.zip
  • Description


    Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know what pentesting framework would be used to meet a specific condition and what information should be delivered in an executive summary. You should know how to scope an assessment and identify what document is used for what purpose and the OWASP Top 10 and identify the hacking methodology used to exploit each one. These are just a few fundamentals that remain constant from one ethical hacking exam.

    This course provides you with the fundamental knowledge every ethical hacker is expected to know. Throughout this course, you will learn about cybersecurity tools, reverse shells, scripting basics, identifying output, and what commands were used to generate the output.

    This course will help you identify security tools and ethical hacking techniques, exploit web application vulnerabilities, appropriate documentation for starting and finalizing a pentest, correct reporting procedures, and appropriately exploit for a given vulnerability.

    By the end of this course, you will have learned the fundamentals of pentesting, and renewed your confidence, and recharged your cyber security career with ease.

    All the resource files are added to the GitHub repository at: https://github.com/PacktPublishing/Pentesting-Fundamentals-for-Beginners

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Cliff Krahenbill
    Cliff Krahenbill
    Instructor's Courses
    Cliff Krahenbill, known as Professor K, is a technology professional and online instructor. He received his master of science degree in cybersecurity from UMUC in 2015 and a master of science degree in information technology from Capella University in 2007. Professor K has been working in the field of technology since 1998 as a Microsoft support technician, Microsoft certified trainer, technology support specialist, senior network technology consultant, IT auditor, and most recently as the owner and operator of his own technology firm, CLK Technology Solutions, located in Tucson, Arizona. Professor K’s expertise in technology lies in designing, building, and supporting network infrastructures and network security. He has been teaching online courses since 2008 and conducts online classes for universities and colleges. He holds numerous technology certifications, which include the following: MCTS: Windows Server 2008 Active Directory, Configuration MCTS: Windows Server 2008 Applications Infrastructure, Configuration MCTS: Windows Server 2008 Network Infrastructure, Configuration A+, Net+, Security+ He spends his spare time working in his woodshop and providing free technical support to the local retirement community in Tucson, Arizona.
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 49
    • duration 7:30:27
    • Release Date 2023/02/07