Pluralsight - Ethical Hacking_ Penetration Testing

seeders: 1
leechers: 4
Added on July 19, 2016 by XXXIII33in Other > Tutorials
Torrent verified.



Pluralsight - Ethical Hacking_ Penetration Testing (Size: 419.92 MB)
 001 - Understanding Penetration Testing - Understanding Penetration Testing.mp45.61 MB
 002 - Understanding Penetration Testing - Why Do Penetration Tests_.mp413.77 MB
 003 - Understanding Penetration Testing - Types of Pen Tests.mp45.83 MB
 004 - Understanding Penetration Testing - Stage 1_ Pre-attack.mp420.76 MB
 005 - Understanding Penetration Testing - Stage 2_ Attack.mp414.38 MB
 006 - Understanding Penetration Testing - Stage 3_ Post-attack.mp43.32 MB
 007 - Understanding Penetration Testing - Pen Testing Standards.mp424.76 MB
 008 - Understanding Penetration Testing - Summary.mp43.94 MB
 009 - Pen Testing_ Reconning and_or Footprinting the Target - Laying the Foundation.mp42.06 MB
 010 - Pen Testing_ Reconning and_or Footprinting the Target - The Steps to a Successful Pen Test.mp49.43 MB
 011 - Pen Testing_ Reconning and_or Footprinting the Target - Summary.mp41023.17 KB
 012 - Pen Testing_ Scanning the Target - Intro to Scanning the Target.mp44.1 MB
 013 - Pen Testing_ Scanning the Target - Steps to Scan the Target.mp411.05 MB
 014 - Pen Testing_ Scanning the Target - Summary.mp4933.74 KB
 015 - Pen Testing_ Enumerating the Target - Intro to Enumerating the Target.mp42.49 MB
 016 - Pen Testing_ Enumerating the Target - Steps to Enumerate the Target.mp49.86 MB
 017 - Pen Testing_ Enumerating the Target - Summary.mp45.59 MB
 018 - Pen Testing_ Hacking the Target - Intro to Hacking the Target.mp45.03 MB
 019 - Pen Testing_ Hacking the Target - Password Cracking.mp417.12 MB
 020 - Pen Testing_ Hacking the Target - Privilege Escalation.mp42.72 MB
 021 - Pen Testing_ Hacking the Target - Service Accounts.mp42.59 MB
 022 - Pen Testing_ Hacking the Target - Hide & Seek Time.mp44.26 MB
 023 - Pen Testing_ Hacking the Target - Covering Our Tracks.mp41.62 MB
 024 - Pen Testing_ Hacking the Target - Summary.mp42.9 MB
 025 - Pen Testing_ Sniffing the Target - Intro to Sniffing the Target.mp42.69 MB
 026 - Pen Testing_ Sniffing the Target - Flooding, Spoofing, & Poisoning.mp47.47 MB
 027 - Pen Testing_ Sniffing the Target - Summary.mp42.33 MB
 028 - Pen Testing_ Social Engineering the Target - Intro to Social Engineering.mp48.58 MB
 029 - Pen Testing_ Social Engineering the Target - Reconnaissance & Creating the Scenario.mp46.36 MB
 030 - Pen Testing_ Social Engineering the Target - Attacking.mp48.38 MB

Description

Ethical Hacking: Penetration Testing
by Dale Meredith

In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network. This course is a 10,000 foot view of penetration testing for the exam.

What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
419.92 MB
seeders:1
leechers:4
Pluralsight - Ethical Hacking_ Penetration Testing