Penetration Testing Essential Training Malcolm Shore LYNDA

Penetration Testing Essential Training | Malcolm Shore | LYNDA
English | Size: 401.15 MB
Category: Tutorial

You’ve secured your systems, you’ve trained your users, and you’ve fortified your network. Think you’re ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. [Read more…]

Pluralsight – Penetration Testing in Action

Pluralsight – Penetration Testing in Action
English | Size: 177.87 MB
Category: CBTs

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you’ll learn about penetration testing in action. First, you’ll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you’ll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. [Read more…]

Pluralsight – Penetration Testing The Big Picture

Pluralsight – Penetration Testing The Big Picture
English | Size: 180.49 MB
Category: Tutorial

Penetration testing is a highly sought after consulting service and a needed information security professional skill set. This course defines penetration testing and highlights its role in the context of a security management program.
[Read more…]

SEC642 Advanced Web App Penetration-BS

SEC642 Advanced Web App Penetration
English | Size: 3.56 GB
Category: Tutorial

includes:
Ondemands
MP3
Tools [Read more…]

SANS SEC642 Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs

SANS SEC642: Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs
English | Size: 123.79 MB
Category: Tutorial

As web applications and their mobile counterparts become more complex and hardened against attack, penetration testers need to continually update the techniques and tools they use to evaluate the security of these systems. This includes understanding how the various new technologies work, which tools work with cutting-edge technologies like HTTP/2 and NoSQL, how to perform special penetration tests like Web Application Firewall inspections, and how to perform custom exploitation to demonstrate maximum impact for the applications you test. This course is designed to expand past the methodology and the ‘how’ when we are presented with the challenges of web penetration testing, and dig into the more esoteric ‘why’ these techniques and tools work, so that you can adapt as needed in your assessments.
[Read more…]

Sans – SEC560 Network Penetration Testing and Ethical Hacking

Sans – SEC560 Network Penetration Testing and Ethical Hacking
English | Size:
Category:

Section 0 – Getting started with your OnDemand SANS series
0.1 Welcome to your Sans OnDemand course
0.2 Introduction to Lab exercises
Section 1 – Comprehensive pen testing planning, scoping and reconnaissance
1.1 Pen testing foundations
1.2 Pen testing process
1.3 Reconnaissance
1.4 Appendix intro to Linux
[Read more…]

LiveLessons – Security Penetration Testing (The Art of Hacking Series)

LiveLessons – Security Penetration Testing (The Art of Hacking Series)
English | Size: 5.42 GB
Category: Tutorial

This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture. [Read more…]

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)
English | Size: 513.36 MB
Category: Tutorial

SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]

Pluralsight – Wireless Network Penetration Testing Advanced Techniques

Pluralsight – Wireless Network Penetration Testing Advanced Techniques
English | Size: 153.54 MB
Category: Tutorial

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you’ll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you’ll delve into rogue access points and fake captive portals.
[Read more…]

Pluralsight – Web Application Penetration Testing Fundamentals

Pluralsight – Web Application Penetration Testing Fundamentals
English | Size: 292.19 MB
Category: CBTs

If you are in charge of building or testing web applications, being familiar with fundamental issues hackers take advantage of is key to defending your product, and your business. In this course, you’ll learn the fundamentals of web app pen testing.
Whether you are a developer or in security understanding how applications are attacked is the key to defending them. In this course, Web Application Penetration Testing Fundamentals, you’ll learn the framework of a successful web application penetration test.
[Read more…]