This course can also assist you if you are pursuing the CompTIA PenTest+ certification. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.
This course will also introduce you to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security.
As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills.
After you complete this course, you will be able to plan, conduct, analyze, and report on penetration tests.
– Plan and scope penetration tests.
– Conduct passive reconnaissance.
– Perform non-technical tests to gather information.
– Conduct active reconnaissance.
– Analyze vulnerabilities.
– Penetrate networks.
– Exploit host-based vulnerabilities.
– Test applications.
– Complete post-exploit tasks.
– Analyze and report pen test results.
This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course.
This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.
To ensure your success in this course, you should have:
– Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
– Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.
You can obtain this level of skills and knowledge by taking the CompTIA® Security+® course or by obtaining the appropriate industry certification.
Lesson 1: Planning and Scoping Penetration Tests
Introduction to Penetration Testing Concepts
Plan a Pen Test Engagement
Scope and Negotiate a Pen Test Engagement
Prepare for a Pen Test Engagement
Lesson 2: Conducting Passive Reconnaissance
Gather Background Information
Prepare Background Findings for Next Steps
Lesson 3: Performing Non-Technical Tests
Perform Social Engineering Tests
Perform Physical Security Tests on Facilities
Lesson 4: Conducting Active Reconnaissance
Scan for Vulnerabilities
Analyze Basic Scripts
Lesson 5: Analyzing Vulnerabilities
Analyze Vulnerability Scan Results
Leverage Information to Prepare for Exploitation
Lesson 6: Penetrating Networks
Exploit Network-Based Vulnerabilities
Exploiting Wireless and RF-Based Vulnerabilities
Exploit Specialized Systems
Lesson 7: Exploiting Host-Based Vulnerabilities
Exploit Windows-Based Vulnerabilities
Exploit *nix-Based Vulnerabilities
Lesson 8: Testing Applications
Exploit Web Application Vulnerabilities
Test Source Code and Compiled Apps
Lesson 9: Completing Post-Exploit Tasks
Use Lateral Movement Techniques
Using Persistence Techniques
Use Anti-Forensics Techniques
Lesson 10: Analyzing and Reporting Pen Test Results
Analyze Pen Test Data
Develop Recommendations for Mitigation Strategies
Write and Handle Reports
Conduct Post-Report-Delivery Activities