Agenda
- Course Introduction
- Business and Technical Logistics for Pen Testing
- Where are We?
- Overview
- What is Penetration Testing?
- Today’s Threats
- Staying Up To Date
- Pen Testing Methodology
- Phase 1 – Pre-Engagement Activities
- Information Gathering – Reconnaissance-Passive (External Only)
- Where are We?
- Overview
- What are we looking for?
- Keeping Track of what we find!
- Where/How do we find this information?
- Are there tools to help?
- Countermeasures
- Detecting Live Systems – Reconnaissance -Active
- Where are We?
- Overview
- What are we looking for?
- Reaching Out!
- Port Scanning
- Are there tools to help?
- Countermeasures
- Banner Grabbing & Enumeration
- Overview
- Banner Grabbing
- Enumeration
- Automated Vulnerability Assessment
- Where are we?
- Overview
- What is a Vulnerability Assessment?
- Tools of the Trade
- Testing Internal/External Systems
- Dealing with the Results
- Hacking Operating Systems
- Where are We?
- Overview
- Key Loggers
- Password Attacks
- Rootkits & Their Friends
- Clearing Tracks
- Advanced Assessment and Exploitation Techniques
- Where are We?
- Overview
- Buffer Overflow
- Exploits
- Exploit Framework
- Evasion Techniques
- Where are We?
- Overview
- Evading Firewall
- Evading Honeypots
- Evading IDS
- Hacking with PowerShell
- Where are We?
- Overview
- PowerShell – A Few Interesting Items
- Finding Passwords with PS
- Networks, Sniffing, and IDS
- Where are We?
- Overview
- Sniffing Techniques
- Assessing and Hacking Web Technologies
- Where are We?
- Overview
- OWASP Top 10
- SQL Injection
- XSS
- Mobile and IoT Hacking
- Where are We?
- Overview
- Quick Introduction
- What Devices are we talking about?
- What is the risk?
- Potential Avenues to Attack
- Hardening Mobile/IoT Devices
- Report Writing Basics
- Where are We?
- Overview
- Report Components
- Report Results Matrix
- Recommendations
FREE
Interested in course?
Course Type: Self Paced