Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Penetration Testing for Highly-Secured Environments to your Wishlist.

Add to Wishlist

Penetration Testing for Highly-Secured Environments

An intensive hands-on course to perform professional penetration testing
3.6 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
417 students enrolled
Last updated 7/2016
$15 $85 82% off
30-Day Money-Back Guarantee
  • 3 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?

The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.

Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.

The goal of this video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more. To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.

If you are looking to practice your network security skills as a penetration testing, through exploitation techniques and strategies, then this video course is for you.

About the Author

Aaron Johns currently works for Intrasect Technologies as an IT Specialist. He provides support for over 160 clients. His work roles include maintaining business networks and security policies to increase operational efficiencies and reduce costs.

Aaron also publishes videos and books for Packt Publishing, one of the most prolific and fast-growing tech book publishers in the world. He has also filmed several independent videos.

Aaron started broadcasting YouTube videos in 2007. In 2009, he was offered a partnership with YouTube. He has provided security awareness to over 1.2 million viewers and 6,300 subscribers. As of today, Aaron still serves as a Technology Partner for YouTube. He is also in partnership with Symantec Corporation and Check Point Software Technologies Ltd. You'll also find Aaron as a guest or interviewed as a security professional on several YouTube videos and podcasts.

Who is the target audience?
  • The Advanced Penetration Testing for Highly-Secured Environments video course is aimed at both newcomers and experienced professionals who wish to gain hands-on experience of advanced penetration testing. You will need elemental IT skills and concepts, knowledge of common network protocols such as TCP/IP, and a basic understanding of penetration testing.
Students Who Viewed This Course Also Viewed
What Will I Learn?
Learn information gathering/Footprinting techniques and enumeration techniques
See how to gain both physical and remote access to secured systems
Navigate through the command prompt and Linux terminal along with the Backtrack 5 R3 Linux operating system
Understand the Metasploit Framework, Social-Engineering Toolkit, Nmap, Zenmap, and more
Learn how to deal with client-side exploitation attacks and advanced techniques to bypass firewalls, IDS, and IPS systems
Create a virtual penetration testing lab
Discover the usage of all the security tools
Generate a full, detailed penetration testing report
View Curriculum
  • This video course takes a progressive approach by first unraveling advanced security techniques and then applying these techniques in a fictional environment. It is thoroughly educational and gives users the opportunity to test their skills.
Curriculum For This Course
Expand All 40 Lectures Collapse All 40 Lectures 02:50:37
Introduction to Advanced Penetration Testing
5 Lectures 19:41

Ever wondered how hackers got into your system or network? Throughout this video course, you will learn advanced techniques on how hackers get into systems and networks. This is very important to know because security awareness can help prevent these attacks.

Preview 03:36

Learn how to install VirtualBox on Windows 7.

Installing VirtualBox

Learn how to install BackTrack 5 R3 in VirtualBox on Windows 7.

Installing BackTrack 5 R3

Learn how to install Metasploitable in VirtualBox on Windows 7.

Installing Metasploitable

Learn how to set up and configure BackTrack 5 R3.

Set up BackTrack 5 R3
Advanced Footprinting
5 Lectures 21:55

Learn what footprinting is, the methods, and also the usage of the tools.

What Is Footprinting?

Learn how to use Nslookup and Dig commands in Windows and Linux.

Using Nslookup and Dig

Learn how to use the Tracert and Traceroute commands in Windows and Linux.

Using Tracert and Traceroute

Learn how to use Paterva Maltego in BackTrack Linux.

Using Paterva Maltego

This video will explain what Google Dorks and Social Engineering is with a few examples.

Google Dorks and Social Engineering
Enumeration: Getting to Know Your Target
5 Lectures 20:36

Enumeration is where you gather information, such as usernames, groups, network shares, services running on the network, and the number of hosts.

What Is Enumeration?

In this video, you will learn how to use Nmap and Zenmap to scan hosts.

Using Nmap and Zenmap

In this video, you will learn how to use SNMPenu and SNMPwalk.

Using SNMPenu and SNMPwalk

Banner grabbing allows you to grab more information from a website, such as the service name and version.

Preview 03:36

Ever wondered how hackers found exploits? In this video, we will be searching for exploits.

Searching for Exploits
Exploitation Applications: Getting to Know Your Tools
5 Lectures 24:00

Exploitation is where you trick a user or system into getting compromised. You can trick a user through social engineering techniques and you can trick a system into running arbitary code.

What Is Exploitation?

In this video, you will learn how to install and configure the Nessus Vulnerability Scanner. 

Installing the Nessus Vulnerability Scanner

In this video, you will learn how to scan a system for a list of vulnerabilities. This can help identify exploits that could affect your system.

Preview 04:52

Always keep the Metasploit Framework up to date with the latest exploits and payloads.

Installing and Updating the Metasploit Framework

Using the Metasploit Framework can help with security awareness. It helps keep the user aware of what is out there that could affect their system or network.

Using the Metasploit Framework
Gaining Physical Access
5 Lectures 16:14

Every day there is always someone talking about their computer or online accounts getting hacked. This video could help stop it from happening to you.

How Do Hackers Break into a Local System?

KON BOOT is a live cd that can bypass passwords just by booting them from the disk. To fix this issue, encrypt your hard drive and use strong complex passwords.

Preview 02:48

Use the Ubuntu Live CD to bypass a Windows partition and copy files and delete files. To fix this issue, encrypt your hard drive.

Breaking into Windows 7-Part 2

Use the Ubuntu Live CD to replace some system files to trick Windows into opening Command Prompt instead of the Sticky Keys dialog box.

Breaking into Windows 7-Part 3

Ophcrack allows you to crack Windows SAM files on the fly. To fix this issue, encrypt your hard drive and use strong complex passwords.

Breaking into Windows 7-Part 4
Exploiting a Client-side Target
5 Lectures 25:27

Every day there is always someone talking about their computer or online accounts getting hacked. This video could help stop it from happening to you.

How Do Hackers Break into a Remote System?

The Social Engineering Toolkit has many different features to exploit an individual. When a pen-tester can't access the system, they try exploiting the user.

Using the Social Engineering Toolkit

Nessus Vulnerability Scanner is one of the best ways to determine if your system is vulnerable to the Internet. Learning to use Nessus is essential for keeping your system safe from hackers.

Preview 05:14

Most business and home users still use Windows XP and 7. What they don't know could potentially leave them at risk in a compromised system and accounts.

Exploiting Windows 7

This is a great way to test out exploits on your own without running into any legal matters. This helps improve security awareness for the user and helps understand how important it is to keep your system up to date with the newest technologies.

Exploiting Metasploitable
Bypassing Web Filters, Firewalls, and IDS
5 Lectures 21:59

Ever wondered how companies get compromised and their accounts get hacked? This video teaches you how hackers break into web filters, firewalls, and IDSes.

Evading Web Filters, Firewalls, and IDSes

Wondered how your staff or students bypassed the web restrictions on the computer? Learn how to use proxies to re-route your traffic to another server.

Bypassing Web Filters-Part 1

Still can't bypass that annoying web filter? Learn how to use a VPN to re-route your traffic over an encrypted network.

Bypassing Web Filters-Part 2

Learn how to use Nmap to stealth scan a target host.

Preview 02:32

Learn how to use Zenmap to stealth scan a target host.

Stealth Scanning-Part 2
Writing a Penetration Testing Report
5 Lectures 20:45

You are done pen-testing the network; now what? You need to write a professional penetration testing report for your client to prove to them what vulnerabilities and exploits are available for their network.

Preview 04:28

Its always good to know what to put in your report before handing it to your client for review.

What Should Be In the Report?

Now that you know why it's important to write a report, it's time to write a report. In this video, you will see an example of what a written report should look like when being handed to a client for review.

Writing a Report

Finally, you can hand in your report to your client. Make sure you have every detail listed; don't forget any vulnerabilities or exploits.

Turning In the Report

Recommendations given by the author

Final Statement by the Author
About the Instructor
3.9 Average rating
3,593 Reviews
29,499 Students
308 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.

Report Abuse