TCM Security Academy – External Pentest Playbook

TCM Security Academy – External Pentest Playbook
English | Size: 1.1GB
Category: Tutorial


This course focuses on external penetration testing tactics and techniques designed to help you improve your pentest game. [Read more…]

PluralSight – Information Gathering And Vulnerability Scanning For Comptia Pentest Plus

PluralSight – Information Gathering And Vulnerability Scanning For Comptia Pentest Plus Bookware-KNiSO
English | Size: 345.88 MB
Category: Tutorial


Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification [Read more…]

PluralSight – Planning and Scoping for CompTIA Pentest+

PluralSight – Planning and Scoping for CompTIA Pentest+ Bookware-KNiSO
English | Size: 178.73 MB
Category: Internet


Your first task in a penetration test project is to define the scope and plan your engagement. [Read more…]

PluralSight – Information Gathering And Vulnerability Identification For Comptia Pentest+

PluralSight – Information Gathering And Vulnerability Identification For Comptia Pentest+-NOLEDGE
English | Size: 173.16 MB
Category: Tutorial


This course is a part 5 of the CompTIA PenTest+ series. You have identified the vulnerabilities, now you will use your toolset to identify how to exploit said vulnerabilities to prepare to for exploitation. [Read more…]

Pluralsight – Penetrating Networks For Comptia PenTest Plus

Pluralsight – Penetrating Networks For Comptia PenTest Plus
English | Size: 1.19 GB
Category: Tutorial


Connecting computing devices together to share files and other resources is certainly an essential part of today’s computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it’s basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement. [Read more…]

Pluralsight – Penetrating Networks For Comptia PenTest Plus

Pluralsight – Penetrating Networks For Comptia PenTest Plus-QUASAR
English | Size: 1.19 GB
Category: Tutorial


Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization. Connecting computing devices together to share files and other resources is certainly an essential part of today’s computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given
network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it’s basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement.n [Read more…]