Practical Pentesting
admin
Last Update August 14, 2022
18 already enrolled
Curriculum
133 Lessons
Module 1 – Introduction to Penetration Testing
Lesson 1 – Penetration Testing – part 100:07:25
Lesson 1 – Penetration Testing – part 200:08:57
Lesson 2 – LPT Penetration Testing Methodology00:04:22
Lesson 3 – Penetration Testing Guidlines and Recommendations00:10:27
Module 2 – Penetration Testing Scoping and Engagement
Lesson 1 – Pre – Engagement Activities00:06:41
Lesson 2 – Request for Proposal (RFP)00:03:06
Lesson 3 – Preparing Response Requirements for Proposal Submission – Part 100:10:07
Lesson 3 – Preparing Response Requirements for Proposal Submission – Part 200:05:22
Lesson 3 – Preparing Response Requirements for Proposal Submission – Part 300:03:02
Lesson 4 – Setting the Rules of Engagement – Part 100:04:52
Lesson 4 – Setting the Rules of Engagement – Part 200:04:14
Lesson 4 – Setting the Rules of Engagement – Part 300:04:26
Lesson 5 – Handling Legal Issues in Penetration Testing Engagement – Part 100:07:42
Lesson 5 – Handling Legal Issues in Penetration Testing Engagement – Part 200:06:09
Lesson 6 – Preparing for Test – Part 100:04:59
Lesson 6 – Preparing for Test – Part 200:05:01
Lesson 6 – Preparing for Test – Part 300:05:32
Lab 1 – Penetration Testing Project Planning and Scheduling Using Gantt Project00:00
Lab 2 – Penetration Testing Project Planning and Scheduling Using OpenProj00:00
Module 3 – Open Source Intelligence (OSINT) Method
Lesson 1 – OSINT Methodology00:02:28
Lesson 2 – OSINT through World Wide Web (www) – Part 100:00
Lesson 2 – OSINT through World Wide Web (www) – Part 200:09:33
Lesson 3 – OSINT through Wide site Analysis00:03:57
Lesson 4 – OSINT through DNS Interrogation00:09:25
Lesson 5 – Automating your OSINT Effort using Tools/Framework/Scripts Path analyzer pro Tool Demo00:04:00
Lab 1 – Performing Information Gathering on a Target Organization00:00
Lab 2 – Network Route Trace Using Path Analyzer Pro00:00
Module 4 – Social Engineering Penetration Testing
Lesson 1 – Social Engineering Penetration Testing00:03:16
Lesson 2 – Social Engineering Penetration Testing using E-mail Attack Vector00:18:37
Lesson 3 – Social Engineering Penetration Testing using Telephone Attack Vector00:03:11
Lesson 4 – Social Engineering Penetration Testing using Physical Attack Vector SET Toolkit Demo00:07:12
Lab 1 – Collecting Sensitive Information about a Target Using Social Engineering Toolkit (SET)00:00
Module 5 -Network Penetration Testing Methodology-
Lesson 1 – Social Engineering Penetration Testing00:03:16
Lesson 2 – Port Scanning – part100:33:31
Lesson 2 – Port Scanning – part200:23:51
Lesson 2 – Port Scanning – part300:15:22
Lesson 3 – OS and Service Fingerprinting00:06:40
Lesson 4 – Vulnerability Research00:05:41
Lesson 5 – Exploit Verification00:01:51
Lab 1 – Exploring and Auditing a Machine Using Nmap00:00
Lab 2 – Accessing Misconfigured FTP Connection on a Remote Machine00:00
Lab 3 – Pentesting freeSSHd Vulnerability and Gaining Privileged Access to a Machine00:00
Module 6 – Network Penetration Testing Methodology
Lesson 1 – Internal Network Penetration Testing00:01:39
Lesson 2 – Footprinting00:04:32
Lesson 3 – Network Scanning00:23:00
Lesson 4 – OS and Service Fingerprinting00:08:16
Lesson 5 – Enumeration – part 100:07:00
Lesson 5 – Enumeration – part 200:04:32
Lesson 6 – Vulnerability Assessment00:03:07
Lesson 7 – Windows Exploitation00:01:40
Lesson 8 – Unix/Linux Exploitation00:07:12
Lesson 9 – Other Internal Network Exploitation Techniques – part 100:09:49
Lesson 9 – Other Internal Network Exploitation Techniques – part 200:10:19
Lesson 9 – Other Internal Network Exploitation Techniques – part 300:04:57
Lesson 10 – Automating Internal Network Penetration Test Effort00:00:46
Lesson 11 – Post Exploitation00:03:29
Lab 1 – Performig Passive OS Fingerprinting to Obtain Remote Operating System Information00:00
Lab 2 – Pentesting Misconfigured RPC Services and NFS Shares00:00
Lab 3 – Enumerating Logged on Users Using Finger Protocal00:00
Lab 4 – Performing Man-in-the-Middle Attack using Cain & Abel00:00
Lab 5 – Auditing a Machine for Weak Passwords Using LOphtcrack00:00
Lab 6 – Automating Penetration Testing Tasks Using Bash Scripting00:00
Lab 7 – Gaining Remote Access to a Windows 10 MAchine00:00
Lab 8 – Vulnerability Scanning with OpenVAS00:00
Lab 9 – Exploiting Windows OS Vulnerability00:00
Lab 10 – Exploiting and Escalating Privileges on a Windows Operating System00:00
Lab 11 – Penetration Testing Buffer Overflow Vulnerability on a Windows Application00:00
Lab 12 – Exploiting and Escalating Privileges on a Linux Operating System00:00
Lab 13 – Penetration Testing Vunerable Machines and Creating a Botnet00:00
Module 7 – Network Penetration Testing Methodology
Lesson 1 – Assessing Firewall Security Implementation – part 100:20:09
Lesson 1 – Assessing Firewall Security Implementation – part 200:06:22
Lesson 1 – Assessing Firewall Security Implementation – part 300:04:19
Lesson 2 – Assessing IDS Security Implementation – part 100:06:17
Lesson 2 – Assessing IDS Security Implementation – part 200:07:34
Lesson 2 – Assessing IDS Security Implementation – part 300:07:02
Lesson 3 – Assessing Security of Routers – part 100:05:03
Lesson 3 – Assessing Security of Routers – part 200:05:26
Lesson 3 – Assessing Security of Routers – part 300:05:35
Lesson 4 – Assessing Security of Switches – part 100:05:14
Lesson 4 – Assessing Security of Switches – part 200:05:13
Lab 1 – Identifying and Bypassing a Firewall00:00
Lab 2 – HTTP Tunnelling to Bypass Firewalls Using HTTPort00:00
Module 8 – Web Application Penetration Testing Met
Lesson 1 – Web Application Penetration Testing00:00
Lesson 2 – Discover Web Application Default Content – Part 100:00
Lesson 2 – Discover Web Application Default Content – Part 200:00
Lesson 3 – Test for SQL Injections Vulnerabilities – Part 100:00
Lesson 3 – Test for SQL Injections Vulnerabilities – Part 200:00
Lesson 3 – Test for SQL Injections Vulnerabilities – Part 300:00
Lesson 4 – Test for Parameter Tampering – Part 100:00
Lesson 4 – Test for Parameter Tampering – Part 200:00
Lesson 5 – Test for Client-Side Attack00:00
Lesson 6 – Tests for Broken Authentication and Authorization Vulnerabilities – Part 100:00
Lesson 6 – Tests for Broken Authentication and Authorization Vulnerabilities – Part 200:00
Lesson 7 – Tests for Broken Session Management Vulnerabilities – Part 100:00
Lesson 7 – Tests for Broken Session Management Vulnerabilities – Part 200:00
Lesson 8 – Test for Business Logic Flaws00:00
Lesson 9 – Test for Web Server Vulnerabilities00:00
Lesson 10 – Test for Thick Client Vulnerabilities00:00
Lab 1 – Gathering Information About a Target Using Whatweb00:00
Lab 2 – Web Application Vulnerability Assessment Using Vega00:00
Lab 3 – Pentesting Identified Web Applications Vulnerabilities00:00
Lab 4 – Pentesting Web Application for Stored XSS and Parameter Manipulation Vulnerabilities00:00
Lab 5 – Exploiting Directory Traversal Vulnerability in WordPress Application00:00
Lab 6 – Performing Dictionary Attack on a WordPress Web Application Using Burp SUite00:00
Lab 7 – Exploiting WordPress Web Application Vulnerability by Uploading a Customized Shell00:00
Lab 8 – Directory Browsing a WordPress Website using Dirbuster and Accessing Shell and Auditing a Machine Using Nmap00:00
Lab 9 – Pentesting Apache Web Server Vulnerability00:00
Module 9 – Database Penetartion Testing Methodolog
Lesson 1 – Information Reconnaissance00:00
Lesson 2 – Database Enumeration :Oracle00:00
Lesson 3 – Database Enumeration:MSSQL Server00:00
Lesson 4 – Vulnerability and Exploit Research00:00
Lesson 5 – Database Exploitation:Oracle00:00
Lesson 6 – Database Exploitation:MS SQL Server00:00
Lesson 7 – Database Exploitation:MySQL00:00
Lab 1 – Pentesting MySQL Database00:00
Lab 2 – SQL Injection Attacks on MS SQL Database00:00
Module 10 – Wireless Penetration Testing Methodolo
Lesson 1 – WLAN Penetration Testing00:00
Lesson 2 – RFID Penetration Testing00:00
Lesson 3 – NFC Penetration Testing00:00
Lesson 4 – Mobile Device Penetration Testing00:00
Lesson 5 – IoT Penetration Testing00:00
Lab 1 – Gaining Complete Access to an Android Device Using Spy Note00:00
Module 11 – Cloud Penetration Testing Methodology
Lesson 1 – Cloud Pen Testing00:00
Lesson 2 – Cloud Reconnaissance00:00
Lesson 3 – Cloud Specific Penetration Testing Part – 100:00
Lesson 3 – Cloud Specific Penetration Testing Part – 200:00
Lab 1 – Causing an XSS Attack on ownCloud00:00
Module 12 – Report Writing and Post Testing Action
Lesson 1 – Report Writing and Post Testing Actions Part – 100:00
Lesson 1 – Report Writing and Post Testing Actions Part – 200:00
Lesson 1 – Report Writing and Post Testing Actions Part – 300:00
Lesson 1 – Report Writing and Post Testing Actions Part – 400:00
Lesson 2 – Post Testing Actions00:00
Lab 1 – Generating Penetration Test Reports and Documenting all of them to Keepnote00:00
Your Instructors
Write a review
Course categories
Related Courses