Companies Home Search Profile

Practical Pentesting

Focused View

Stone River eLearning

7:19:11

16 View
  • 1.1 Practical Pentesting with Brad Stine.zip
  • 1. Overview.mp4
    02:14
  • 2. Pentesters - The Good, Bad and Ugly.mp4
    28:04
  • 3. Pre-Engagement.mp4
    24:37
  • 4. Pre-Engagement Part 2.mp4
    28:17
  • 5. Data Security Agreements.mp4
    23:40
  • 6. Statement of Work (SOW).mp4
    26:04
  • 7. Statement of Work (SOW) Part 2.mp4
    23:46
  • 8. Statement of Work (SOW) Part 3.mp4
    18:08
  • 9. Final Authorization.mp4
    13:14
  • 10. Personal Engagement Toolkit.mp4
    29:48
  • 11. Pentesting Platforms.mp4
    22:37
  • 12. Stages of Assessment Validate Scope.mp4
    17:32
  • 13. Stages of Assessment Recon.mp4
    14:35
  • 14. Stages of Assessment Vulnerability Scan.mp4
    27:04
  • 15. Stages of Assessment Vulnerability Scan Part 2.mp4
    09:18
  • 16. Stages of Assessment Documenting.mp4
    18:48
  • 17. Stages of Assessment Exploitation.mp4
    18:33
  • 18. Stages of Assessment Maintaining Access.mp4
    16:13
  • 19. Stages of Assessment Covering Tracks.mp4
    15:48
  • 20. Stages of Assessment Deliverables.mp4
    30:46
  • 21. Blue Team Pentesting.mp4
    30:05
  • Description


    All about Pentesting

    What You'll Learn?


    • Learn to be a good pentester. This includes how to interview, how certifications come into play, and then exploring how to find the right company and/or engag
    • Learn some of the common elements and practices of a pentester during the pre-engagement phase of an assessment. This includes learning what the customer want
    • Learn about data security agreements, otherwise known as non-disclosure agreements(NDA), that are crucial to the pentesting process.
    • Understand Statement of Work (SOW). The importance of the SOW, as well as looking at some of the common elements found in an SOW..
    • Explore the options available to pentesters in the realm of popular pentesting platforms such as Kali, Parrot, and Black Arch.

    Who is this for?


  • Organizations
  • Security Teams
  • Compliance and Audit Teams
  • Managed Security Service Providers (MSSPs)
  • Developers and DevOps Teams
  • Executive Management
  • What You Need to Know?


  • There is no specific prerequisite for taking this course. Basic understanding of cyber threats helps!
  • More details


    Description

    In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through the lens of Brad's experience as a Pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.

    There are several pentesting platforms available in the market that can assist in conducting penetration testing and vulnerability assessments. These platforms provide a range of tools and functionalities to identify and exploit vulnerabilities in computer systems, networks, and applications

    A typical penetration testing engagement consists of several stages or phases that help guide the assessment process. These stages ensure a systematic and comprehensive approach to identifying vulnerabilities and assessing the security posture of the target system. The specific names and order of the stages may vary depending on the methodology followed by the pentester or the organization conducting the assessment.

    The course includes Blue Team pentesting, also known as defensive security testing or purple teaming, is a practice where a team of security professionals simulates real-world attacks on a company's systems and infrastructure to evaluate and improve the organization's defensive capabilities. Unlike traditional penetration testing (red teaming), which focuses on identifying vulnerabilities and exploiting them, blue team pentesting is centered around assessing and enhancing the effectiveness of an organization's security controls and incident response processes.

    Who this course is for:

    • Organizations
    • Security Teams
    • Compliance and Audit Teams
    • Managed Security Service Providers (MSSPs)
    • Developers and DevOps Teams
    • Executive Management

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Stone River eLearning
    Stone River eLearning
    Instructor's Courses
    At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 1000+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 21
    • duration 7:19:11
    • Release Date 2023/11/21

    Courses related to Penetration Testing