CYS4310 - Penetration Testing

(ANC-CYS4310.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Penetration Testing and Standards

  • What Is Penetration Testing?
  • Terminology
  • Methodologies
  • Ethical Issues
  • Legal Issues
  • Certifications
  • Careers in Penetration Testing
  • Building Your Skillset
  • PCI DSS
  • NIST 800-115
  • National Security Agency InfoSec Assessment Methodology (NSA-IAM)
  • PTES
  • CREST (UK)
  • A Synthesis (Putting Standards Together into a Single Unified Approach)
  • Related Standards
  • Other Standards
  • Test Your Skills
2

Cryptography, Reconnaissance, and Malware

  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Password Crackers
  • Steganography
  • Cryptanalysis
  • Learning More
  • Passive Scanning Techniques
  • Active Scanning Techniques
  • Wireshark
  • Maltego
  • Other OSINT Tools
  • Viruses
  • Trojan Horses
  • Other Forms of Malware
  • Creating Malware
  • Test Your Skills
3

Hacking Windows, Web Hacking, and Vulnerability Scanning

  • Windows Details
  • Windows Password Hashing
  • Windows Hacking Techniques
  • Windows Scripting
  • Windows Password Cracking
  • Detecting Malware in Windows
  • Cain and Abel
  • Web Technology
  • Specific Attacks on Websites
  • Tools
  • Vulnerabilities
  • Packet Capture
  • Network Scanners
  • Wireless Scanners/Crackers
  • General Scanners
  • Web Application Scanners
  • Cyber Threat Intelligence
  • Test Your Skills
4

General Hacking Techniques & Knowledge, and Metasploit

  • Wi-Fi Testing
  • Social Engineering
  • DoS
  • Conferences
  • Dark Web
  • Certification and Training
  • Cyber Warfare and Terrorism
  • Nation State Actors
  • Background on Metasploit
  • Getting Started with Metasploit
  • Basic Usage of msfconsole
  • Scanning with Metasploit
  • How to Use Exploits
  • Exploit Examples
  • Post Exploits
  • Test Your Skills
5

More Metasploit, Linux Hacking and Pen Test Project

  • Meterpreter and Post Exploits
  • msfvenom
  • More Metasploit Attacks
  • More on the Linux OS
  • Linux Firewall
  • Syslogd
  • Scripting
  • Linux Passwords
  • Linux Hacking Tricks
  • Test Your Skills
  • Pen Test Outline
  • Report Outline
  • Summary

1

Introduction to Penetration Testing and Standards

  • Reviewing an Authorization Letter for Penetration Testing
  • Reviewing a Confidential Penetration Report
2

Cryptography, Reconnaissance, and Malware

  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
  • Scanning an OS Using Nmap
  • Scanning a Port Using nmap
3

Hacking Windows, Web Hacking, and Vulnerability Scanning

  • Covering Tracks
  • Exploiting a Website Using SQL Injection
  • Grabbing User Credentials Using Wireshark
  • Using MBSA
4

General Hacking Techniques & Knowledge, and Metasploit

  • Simulating DDoS Attack
  • Exploiting Windows 7 Using Metasploit
  • Searching Vulnerability Using Metasploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
5

More Metasploit, Linux Hacking and Pen Test Project

  • Hacking Windows Using Metasploit
  • Enabling a Keylogger in a Target Machine

Related Courses

All Courses
scroll to top