Security Penetration Testing The Art of Hacking Series LiveLessons

10 Hours of Expert Video Instruction Overview This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking...

Descripción completa

Detalles Bibliográficos
Otros Autores: Santos, Omar, author (author), Sternstein, Jon, author, Taylor, Ron, author, McCoy, Chris, author
Formato: Video
Idioma:Inglés
Publicado: Cisco Press 2017.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631083306719
Descripción
Sumario:10 Hours of Expert Video Instruction Overview This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. Also covered are numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, and Maltego. You'll find guidelines on how to write penetration testing reports, and learn how to plan and organize the them. This course provides supplemental material to reinforce some of the critical concepts and techniques learned, scripts to help you build your own hacking environment, and examples of real-life penetration testing reports. This material can be accessed at theartofhacking.org . While there are a variety of ethical hacking and cybersecurity certifications out there, this course is meant to introduce people to the concepts behind ethical hacking and penetration testing and is certification agnostic. Topics include: Lesson 1: Overview of Ethical Hacking and Penetration Testing Lesson 2: Kali Linux Lesson 3: Passive Reconnaissance Lesson 4: Active Reconnaissance Lesson 5: Hacking Web Applications Lesson 6: Hacking User Credentials Lesson 7; Hacking Databases Lesson 8: Hacking Networking Devices Lesson 9: Fundamentals of Wireless Hacking Lesson 10: Buffer Overflows Lesson 11: Powershell Attacks Lesson 12: Evasion and Post Exploitation Techniques Lesson 13: Social Eng...
Notas:Title from title screen (viewed September 13, 2017).
Descripción Física:1 online resource (1 video file, approximately 11 hr., 46 min.)