وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learning Penetration Testing

سرفصل های دوره

You've likely done everything you can to logically secure your systems. But how can you be sure that you’re fully protected from an attack? This course provides an overview of one of the most important skills for today’s IT security professional: penetration testing, the process of testing a computer, system, network, or application to evaluate its ability to withstand an attack. Cybersecurity expert Lisa Bock reviews the key differences between known and unknown tests, manual and automated tests, announced and unannounced tests, and more. Gather tips and pointers designed to help you get up and running, so you can choose the types of tests that will work best for you. Along the way, learn how to wield cutting-edge reconnaissance tools like scanners, password crackers, search engines, list makers, and APIs to deliver consistent, time-sensitive test results. By the end of this course, you’ll be equipped with new techniques and testing blueprints for Wi-Fi, networks, websites, email, VoIP, cloud-native services, mobile infrastructure, human firewalls, and beyond.


01 - Introduction
  • 01 - Testing an organizations defenses
  • 02 - Getting the most out of this course

  • 02 - 1. Organizational Penetration Testing
  • 01 - Understanding penetration testing
  • 02 - Auditing security mechanisms
  • 03 - Managing risk
  • 04 - Analyzing risk
  • 05 - Recognizing the attack surface

  • 03 - 2. Types of Penetration Testing
  • 01 - Comparing different environments
  • 02 - Checking from the outside in
  • 03 - Looking inside the organization
  • 04 - Determining testing methods
  • 05 - Discovering pen testing tools
  • 06 - Challenge Explain the NIST five framework core functions
  • 07 - Solution Explain the NIST five framework core functions

  • 04 - 3. Penetration Testing Techniques
  • 01 - Following a structured plan
  • 02 - Planning the pen test
  • 03 - Footprinting the target
  • 04 - Escalating privileges
  • 05 - Attacking the system
  • 06 - Delivering the results
  • 07 - Outlining remediation strategies

  • 05 - 4. Penetration Testing Blueprint
  • 01 - Checking physical security
  • 02 - Identifying wireless vulnerabilities
  • 03 - Testing the website
  • 04 - Leaking data via email or VoIP
  • 05 - Safeguarding cloud services
  • 06 - Assessing the mobile infrastructure
  • 07 - Hacking the human

  • 06 - 5. Outsourcing Penetration Testing
  • 01 - Contracting the pen test
  • 02 - Defining the project scope
  • 03 - Hiring consultants
  • 04 - Agreeing on terms
  • 05 - Creating the contracts

  • 07 - Conclusion
  • 01 - Whats next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 9656
    حجم: 329 مگابایت
    مدت زمان: 105 دقیقه
    تاریخ انتشار: 26 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید