Course curriculum

    1. Description

    1. 1.0 PenTest Plus Introduction

    2. 1.1 PenTest Plus Topics

    3. 1.2 PenTest Engagement

    4. 1.3 Threat Modeling

    5. 1.4 Technical Constraints

    6. 1.5 PenTest Engagement Review

    7. 1.6 Examining PenTest Engagement Documents Act

    1. 2.1 Passive Reconnaissance part1

    2. 2.2 WHOIS Act

    3. 2.3 Passive Reconnaissance part2

    4. 2.4 Google Hacking Act

    5. 2.5 Passive Reconnaissance part3

    6. 2.6 DNS Querying Act

    7. 2.7 Passive Reconnaissance part4

    8. 2.8 Email Server Querying Act

    9. 2.9 SSL-TLS Cerfificates

    10. 2.10 Shodan Act

    11. 2.11 The Havester

    12. 2.12 TheHarvester Act

    13. 2.13 Recon-ng

    14. 2.14 Recon-g Act

    15. 2.14 Recon-ng-Part-2-API-key Act

    16. 2.15 Maltego

    17. 2.16 Have I been Pwned

    18. 2.17 Punked and Owned Pwned Act

    19. 2.18 Fingerprinting Organization with Collected Archives

    20. 2.19 FOCA Act

    21. 2.20 Findings Analysis Weaponization

    22. 2.21 Chp 2 Review

    1. 3.1 Active Reconnaissannce

    2. 3.2 Discovery Scans Act

    3. 3.3 Nmap

    4. 3.4 Nmap Scans Types Act

    5. 3.5 Nmap Options

    6. 3.6 Nmap Options Act

    7. 3.7 Stealth Scans

    8. 3.8 Nmap Stealth Scans Act

    9. 3.9 Full Scans

    10. 3.10 Full Scans Act

    11. 3.11 Packet Crafting

    12. 3.12 Packet Crafting Act

    13. 3.13 Network Mapping

    14. 3.14 Metasploit

    15. 3.15 Scanning with Metasploit Act

    16. 3.16 Enumeration

    17. 3.17 Banner Grabbing Act

    18. 3.18 Windows Host Enumeration

    19. 3.19 Winddows Host Enumeration Act

    20. 3.20 Linux Host Enumeration

    21. 3.21 Linux Host Enumeration Act

    22. 3.22 Service Enumeration

    23. 3.23 Service Enumeration Act

    24. 3.24 Network Shares

    25. 3.25 SMB Share Enumeration Act

    26. 3.26 NFS Network Share Enumeration

    27. 3.27 NFS Share Enumeration Act

    28. 3.28 Null Sessions

    29. 3.29 Null Sessions Act

    30. 3.30 Website Enumeration

    31. 3.31 Website Enumeration Act

    32. 3.32 Vulnerability Scans

    33. 3.33 Compliance Scans Act

    34. 3.34 Credentialed Non-credentialed Scans

    35. 3.35 Using Credentials in Scans Act

    36. 3.36 Server Service Vulnerability Scan

    37. 3.37 Vulnerability Scanning Act

    38. 3.38 Web Server Database Vulnerability Scan

    39. 3.39 SQL Vulnerability Scanning Act

    40. 3.40 Vulnerability Scan Part 2 OpenVAS Act

    41. 3.41 Web App Vulnerability Scan

    42. 3.42 Web App Vulnerability Scanning Act

    43. 3.43 Network Device Vulnerability Scan

    44. 3.44 Network Device Vuln Scanning Act

    45. 3.45 Nmap Scripts

    46. 3.46 Using Nmap Scripts for Vuln Scanning Act

    47. 3.47 Packet Crafting for Vulnerbility Scans

    48. 3.48 Firewall Vulnerability Scans

    49. 3.49 Wireless Access Point Vunerability

    50. 3.50 Wireless AP Scans Act

    51. 3.51 WAP Vulnerability Scans

    52. 3.52 Container Security issues

    53. 3.53 How to Update Metasploit Pro Expired Trial License

    1. 4.1 Physical Security

    2. 4.2 Badge Cloning Act

    3. 4.3 Physical Security Review

    1. 5.1 Social Engineering

    2. 5.2 Using Baited USB Stick Act

    3. 5.3 Using Social Enginnering to Assist Attacks

    4. 5.4 Phishing Act

    5. 5.5 Social Engineering Review

About this course

  • £229.00
  • 244 lessons
  • 34 hours of video content

Discover your potential, starting today