Shopping Cart

Become a Learning.ly Instructor

Getting Started with Pentesting

194 minutes of course content

Review course syllabus

$19.99 (taxes calculated at checkout)

100% money-back guarantee  |  Click here to read more

Share this course:
Facebook Google LinkedIn Pinterest Twitter

Course Description

Build robust and highly-secured environments with the most advanced tools and techniques

About This Video

  • Get to grips with proven techniques and latest methods to defeat even the toughest threats
  • Build your own pentesting lab environment to practice advanced techniques
  • Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing

In Detail

With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems.

After taking this course, you will be able to:

  • The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills.

This course is for professionals within the following business functions:

  • Everyone is welcome in this course.

    1. Installation and Setup - 25 Minutes

      1. The Course Overview
      2. Installing Kali Virtual Machine
      3. Setting Up Metasploitable2
      4. Setting up Kali Virtual Machine
      5. Setting up Third Party Tools on Kali
    2. Introduction to Penetration Testing - 20 Minutes

      1. Penetration Testing Classification
      2. Pentesting Methodology
      3. Gathering the Client Requirements
      4. Target Scoping
    3. Getting Organized with Essential Tools - 63 Minutes

      1. Walkthrough of Kali
      2. Using Nmap
      3. Introduction to the Metasploit Framework
      4. Wireshark Basics
      5. A Burpsuite Walkthrough – Basics
    4. Information Discovery – Reconnaissance - 39 Minutes

      1. Types of Reconnaissance – Active and Passive
      2. Using NsLookup
      3. Using Traceroute/Tracert
      4. Gathering Open Web Information
      5. Scanning Using Nmap
    5. Scanning – Enumerating Target - 47 Minutes

      1. Detailed Walkthrough - Nmap
      2. Nmap Scripting Engine (NSE)
      3. Scan Types – Nmap
      4. Exporting Nmap Scan Output
      5. Introduction to Zenmap – Graphical Nmap
      6. Banner Grabbing with Netcat

    About the Expert

    Packt

    Packt

    Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work. With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now. From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer. Packt Learning.ly courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.
    Read more