Advanced Penetration Testing for Highly-Secured Environments [Video]

Advanced Penetration Testing for Highly-Secured Environments [Video]

Progressing
Aaron Johns

$25.50
RRP $84.99
$12.99 p/month

Want this title & more? Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.
Code Files
+ Collection
Free Sample

Video Details

ISBN 139781782164500
Course Length2 hour 50 minutes

About This Video

  • Learn how to perform an efficient, organized, and effective penetration test from start to finish
  • Explore advanced techniques to bypass firewalls and IDS, and remain hidden
  • Discover advanced exploitation methods on even the most updated systems

Who This Video Is For

The "Advanced Penetration Testing for Highly-Secured Environments" video course is aimed at both newcomers and experienced professionals who wish to gain hands-on experience of advanced penetration testing. You will need elemental IT skills and concepts, knowledge of common network protocols such as TCP/IP, and a basic understanding of penetration testing.

Table of Contents

Introduction to Advanced Penetration Testing
What Is Advanced Penetration Testing?
Installing VirtualBox
Installing BackTrack 5 R3
Installing Metasploitable
Set up BackTrack 5 R3
Advanced Footprinting
What Is Footprinting?
Using Nslookup and Dig
Using Tracert and Traceroute
Using Paterva Maltego
Google Dorks and Social Engineering
Enumeration: Getting to Know Your Target
What Is Enumeration?
Using Nmap and Zenmap
Using SNMPenu and SNMPwalk
Banner Grabbing with Netcat
Searching for Exploits
Exploitation Applications: Getting to Know Your Tools
What Is Exploitation?
Installing the Nessus Vulnerability Scanner
Using the Nessus Vulnerability Scanner-Part 1
Installing and Updating the Metasploit Framework
Using the Metasploit Framework
Gaining Physical Access
How Do Hackers Break into a Local System?
Breaking into Windows 7-Part 1
Breaking into Windows 7-Part 2
Breaking into Windows 7-Part 3
Breaking into Windows 7-Part 4
Exploiting a Client-side Target
How Do Hackers Break into a Remote System?
Using the Social Engineering Toolkit
Using the Nessus Vulnerability Scanner-Part 2
Exploiting Windows 7
Exploiting Metasploitable
Bypassing Web Filters, Firewalls, and IDS
Evading Web Filters, Firewalls, and IDSes
Bypassing Web Filters-Part 1
Bypassing Web Filters-Part 2
Stealth Scanning-Part 1
Stealth Scanning-Part 2
Writing a Penetration Testing Report
Why Is It So Important to Write a Report?
What Should Be In the Report?
Writing a Report
Turning In the Report
Final Statement by the Author

What You Will Learn

  • Learn information gathering/Footprinting techniques and enumeration techniques
  • See how to gain both physical and remote access to secured systems
  • Navigate through the command prompt and Linux terminal along with the Backtrack 5 R3 Linux operating system
  • Understand the Metasploit Framework, Social-Engineering Toolkit, Nmap, Zenmap, and more
  • Learn how to deal with client-side exploitation attacks and advanced techniques to bypass firewalls, IDS, and IPS systems
  • Create a virtual penetration testing lab
  • Discover the usage of all the security tools
  • Generate a full, detailed penetration testing report

In Detail

The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.

Advanced Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the overwhelming threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.

The goal of the Advanced Penetration Testing for Highly-Secured Environments video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more.
To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.

If you are looking to advance in the IT security field, through advanced exploitation techniques and strategies, then this video course is for you.

Authors

Screenshots

Table of Contents

Introduction to Advanced Penetration Testing
What Is Advanced Penetration Testing?
Installing VirtualBox
Installing BackTrack 5 R3
Installing Metasploitable
Set up BackTrack 5 R3
Advanced Footprinting
What Is Footprinting?
Using Nslookup and Dig
Using Tracert and Traceroute
Using Paterva Maltego
Google Dorks and Social Engineering
Enumeration: Getting to Know Your Target
What Is Enumeration?
Using Nmap and Zenmap
Using SNMPenu and SNMPwalk
Banner Grabbing with Netcat
Searching for Exploits
Exploitation Applications: Getting to Know Your Tools
What Is Exploitation?
Installing the Nessus Vulnerability Scanner
Using the Nessus Vulnerability Scanner-Part 1
Installing and Updating the Metasploit Framework
Using the Metasploit Framework
Gaining Physical Access
How Do Hackers Break into a Local System?
Breaking into Windows 7-Part 1
Breaking into Windows 7-Part 2
Breaking into Windows 7-Part 3
Breaking into Windows 7-Part 4
Exploiting a Client-side Target
How Do Hackers Break into a Remote System?
Using the Social Engineering Toolkit
Using the Nessus Vulnerability Scanner-Part 2
Exploiting Windows 7
Exploiting Metasploitable
Bypassing Web Filters, Firewalls, and IDS
Evading Web Filters, Firewalls, and IDSes
Bypassing Web Filters-Part 1
Bypassing Web Filters-Part 2
Stealth Scanning-Part 1
Stealth Scanning-Part 2
Writing a Penetration Testing Report
Why Is It So Important to Write a Report?
What Should Be In the Report?
Writing a Report
Turning In the Report
Final Statement by the Author

Video Details

ISBN 139781782164500
Course Length2 hour 50 minutes
Read More

Recommended for You

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
Building Virtual Pentesting Labs for Advanced Penetration Testing
$ 35.99
Kali Linux Wireless Penetration Testing: Beginner's Guide
$ 35.99
Penetration Testing with Perl
$ 26.99
Mastering Wireless Penetration Testing for Highly Secured Environments
$ 26.99