Penetration Testing for Highly-Secured Environments

An intensive hands-on course to perform professional penetration testing
3.2 (8 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
402 students enrolled
$85
Take This Course
  • Lectures 40
  • Contents Video: 3 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2014 English

Course Description

The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.

Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.

The goal of this video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more. To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.

If you are looking to practice your network security skills as a penetration testing, through exploitation techniques and strategies, then this video course is for you.

About the Author

Aaron Johns currently works for Intrasect Technologies as an IT Specialist. He provides support for over 160 clients. His work roles include maintaining business networks and security policies to increase operational efficiencies and reduce costs.

Aaron also publishes videos and books for Packt Publishing, one of the most prolific and fast-growing tech book publishers in the world. He has also filmed several independent videos.

Aaron started broadcasting YouTube videos in 2007. In 2009, he was offered a partnership with YouTube. He has provided security awareness to over 1.2 million viewers and 6,300 subscribers. As of today, Aaron still serves as a Technology Partner for YouTube. He is also in partnership with Symantec Corporation and Check Point Software Technologies Ltd. You'll also find Aaron as a guest or interviewed as a security professional on several YouTube videos and podcasts.

What are the requirements?

  • This video course takes a progressive approach by first unraveling advanced security techniques and then applying these techniques in a fictional environment. It is thoroughly educational and gives users the opportunity to test their skills.

What am I going to get from this course?

  • Learn information gathering/Footprinting techniques and enumeration techniques
  • See how to gain both physical and remote access to secured systems
  • Navigate through the command prompt and Linux terminal along with the Backtrack 5 R3 Linux operating system
  • Understand the Metasploit Framework, Social-Engineering Toolkit, Nmap, Zenmap, and more
  • Learn how to deal with client-side exploitation attacks and advanced techniques to bypass firewalls, IDS, and IPS systems
  • Create a virtual penetration testing lab
  • Discover the usage of all the security tools
  • Generate a full, detailed penetration testing report

What is the target audience?

  • The Advanced Penetration Testing for Highly-Secured Environments video course is aimed at both newcomers and experienced professionals who wish to gain hands-on experience of advanced penetration testing. You will need elemental IT skills and concepts, knowledge of common network protocols such as TCP/IP, and a basic understanding of penetration testing.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to Advanced Penetration Testing
03:36

Ever wondered how hackers got into your system or network? Throughout this video course, you will learn advanced techniques on how hackers get into systems and networks. This is very important to know because security awareness can help prevent these attacks.

04:42

Learn how to install VirtualBox on Windows 7.

04:24

Learn how to install BackTrack 5 R3 in VirtualBox on Windows 7.

02:47

Learn how to install Metasploitable in VirtualBox on Windows 7.

04:12

Learn how to set up and configure BackTrack 5 R3.

Section 2: Advanced Footprinting
03:04

Learn what footprinting is, the methods, and also the usage of the tools.

04:13

Learn how to use Nslookup and Dig commands in Windows and Linux.

04:35

Learn how to use the Tracert and Traceroute commands in Windows and Linux.

04:47

Learn how to use Paterva Maltego in BackTrack Linux.

05:16

This video will explain what Google Dorks and Social Engineering is with a few examples.

Section 3: Enumeration: Getting to Know Your Target
02:32

Enumeration is where you gather information, such as usernames, groups, network shares, services running on the network, and the number of hosts.

06:07

In this video, you will learn how to use Nmap and Zenmap to scan hosts.

04:51

In this video, you will learn how to use SNMPenu and SNMPwalk.

03:36

Banner grabbing allows you to grab more information from a website, such as the service name and version.

03:30

Ever wondered how hackers found exploits? In this video, we will be searching for exploits.

Section 4: Exploitation Applications: Getting to Know Your Tools
04:18

Exploitation is where you trick a user or system into getting compromised. You can trick a user through social engineering techniques and you can trick a system into running arbitary code.

04:21

In this video, you will learn how to install and configure the Nessus Vulnerability Scanner. 

04:52

In this video, you will learn how to scan a system for a list of vulnerabilities. This can help identify exploits that could affect your system.

02:57

Always keep the Metasploit Framework up to date with the latest exploits and payloads.

07:32

Using the Metasploit Framework can help with security awareness. It helps keep the user aware of what is out there that could affect their system or network.

Section 5: Gaining Physical Access
03:27

Every day there is always someone talking about their computer or online accounts getting hacked. This video could help stop it from happening to you.

02:48

KON BOOT is a live cd that can bypass passwords just by booting them from the disk. To fix this issue, encrypt your hard drive and use strong complex passwords.

03:00

Use the Ubuntu Live CD to bypass a Windows partition and copy files and delete files. To fix this issue, encrypt your hard drive.

04:31

Use the Ubuntu Live CD to replace some system files to trick Windows into opening Command Prompt instead of the Sticky Keys dialog box.

02:28

Ophcrack allows you to crack Windows SAM files on the fly. To fix this issue, encrypt your hard drive and use strong complex passwords.

Section 6: Exploiting a Client-side Target
05:27

Every day there is always someone talking about their computer or online accounts getting hacked. This video could help stop it from happening to you.

04:00

The Social Engineering Toolkit has many different features to exploit an individual. When a pen-tester can't access the system, they try exploiting the user.

05:14

Nessus Vulnerability Scanner is one of the best ways to determine if your system is vulnerable to the Internet. Learning to use Nessus is essential for keeping your system safe from hackers.

05:04

Most business and home users still use Windows XP and 7. What they don't know could potentially leave them at risk in a compromised system and accounts.

05:42

This is a great way to test out exploits on your own without running into any legal matters. This helps improve security awareness for the user and helps understand how important it is to keep your system up to date with the newest technologies.

Section 7: Bypassing Web Filters, Firewalls, and IDS
05:38

Ever wondered how companies get compromised and their accounts get hacked? This video teaches you how hackers break into web filters, firewalls, and IDSes.

05:21

Wondered how your staff or students bypassed the web restrictions on the computer? Learn how to use proxies to re-route your traffic to another server.

03:39

Still can't bypass that annoying web filter? Learn how to use a VPN to re-route your traffic over an encrypted network.

02:32

Learn how to use Nmap to stealth scan a target host.

04:49

Learn how to use Zenmap to stealth scan a target host.

Section 8: Writing a Penetration Testing Report
04:28

You are done pen-testing the network; now what? You need to write a professional penetration testing report for your client to prove to them what vulnerabilities and exploits are available for their network.

03:55

Its always good to know what to put in your report before handing it to your client for review.

04:43

Now that you know why it's important to write a report, it's time to write a report. In this video, you will see an example of what a written report should look like when being handed to a client for review.

03:13

Finally, you can hand in your report to your client. Make sure you have every detail listed; don't forget any vulnerabilities or exploits.

04:26

Recommendations given by the author

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Packt Publishing, Tech Knowledge in Motion

Over the past ten years Packt Publishing has developed an extensive catalogue of over 2000 books, e-books and video courses aimed at keeping IT professionals ahead of the technology curve. From new takes on established technologies through to the latest guides on emerging platforms, topics and trends – Packt's focus has always been on giving our customers the working knowledge they need to get the job done. Our Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.

Ready to start learning?
Take This Course