Internet And Network Technologies
Advanced Pen Testing Techniques
Pen Testing: Advanced Pen Testing Techniques

Pen Testing: Advanced Pen Testing Techniques

Course Number:
it_soadptdj_01_enus
Lesson Objectives

Pen Testing: Advanced Pen Testing Techniques

  • discover the key concepts covered in this course
  • describe how to find a vulnerability using scanners and other techniques
  • capture and analyze network traffic using Wireshark
  • recognize wireless security technologies such as WEP, WPA/2/3, and the vulnerabilities they have that could be exploited
  • describe cryptography and its four goals
  • differentiate between symmetric and asymmetric cryptography
  • recognize how to choose a password cracking technique
  • differentiate between malware types and recognize some of the consequences of using targeted malware
  • differentiate between scanning and enumeration
  • recognize the benefits of using Python to build scripts and deliver exploits
  • perform Linux privilege escalation via writeable /etc/passwd file
  • perform Windows privilege escalation to exploit a Windows system using the AlwaysInstallElevated technique
  • use PowerShell to perform pen testing tasks such as reporting on all USB devices installed, killing processes, and using PSDrive to view objects in Windows 
  • summarize the key concepts covered in this course

Overview/Description

Explore advanced penetration testing tools and techniques used to find vulnerabilities, sniff network traffic, deal with cryptography, and crack passwords. Discover the benefits of using the Python programming language to build scripts and deliver tools, and examine common techniques used to find weaknesses in both Linux and Windows-based systems.



Target

Prerequisites: none

Close Chat Live