17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Lynda and other Courses >>> https://freecoursesonline.me/ Forum for discussion >>> https://1hack.us/
CBT Nuggets - Penetration Testing Tools [FCO]
Penetration Testing Tools Online Training
This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target's vulnerabilities. This training is also associated with the CompTIA PenTest+ certification.
In the world of network and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they're not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated.
This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.
For anyone who leads a technology team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource.
Penetration Testing Tools: What You Need to Know
This Penetration Testing Tools training has videos that cover topics such as:
• Identifying vulnerabilities and building a plan of attack • Exploiting targets revealed in scans and attacking devices • Deploying industry pentest tools like Kali, network mappers, password crackers, and more
Who Should Take Penetration Testing Tools Training?
This Penetration Testing Tools training is considered foundational-level CompTIA training, which means it was designed for security technicians. This pentration testing skills course is valuable for new IT professionals with at least a year of experience with penetration testing tools and experienced security technicians looking to validate their CompTIA skills.
New or aspiring security technicians. For brand new security technicians, this Penetration Testing Tools training might be slightly specialized -- there are fundamentals about network security that will provide a better foundation for a career at the very outset. However, learning how to use the tools used in penetration tests can make you a better network security operator and can eventually lead to getting placed on pentest teams -- prepare for that eventuality with this training.
Experienced security technicians. If you've been working as a security technician for several years and you've been itching to advance in your career into doing penetration tests, this training will familiarize you with the tools that make them happen. Some are open source, others are paid products, but knowing the tools that support penetration testing can prepare you for the more advanced work of pentests and secure your place on those teams.
About Author
Bob Salmans - Nugget trainer since 2020
“I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.”
Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.
General Info:
Author: Bob Salmans Language: English Released: 2022 Duration: 19h 9m Course Source: https://www.cbtnuggets.com/it-training/cyber-security/penetration-testing-tools
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/1. Get Free Premium Accounts Daily On Our Discord Server!.txt
1.3 KB
1. Pentesting Reconnaissance.mp4
25.5 MB
10. Basic NMAP Commands.mp4
28.1 MB
100. Linux SUID and SUDO privilege escalation.mp4
41.4 MB
101. Linux Local Exploit Privilege Escalation.mp4
80.3 MB
102. Physical Pentest Documents.mp4
38.3 MB
103. Reconnaissance and Planning.mp4
29.2 MB
104. Physical Pentest Tools.mp4
53.2 MB
105. Getting Inside.mp4
33.5 MB
106. Continuing From the Inside.mp4
31.2 MB
107. Physical Pentest Report.mp4
28 MB
108. Credential Attacks Pt.1.mp4
38 MB
109Credential Attacks Pt.2.mp4
42.9 MB
11. Ping Scans with NMAP.mp4
22.4 MB
110. Creating Custom Wordlists.mp4
61 MB
111. Performing a Brute Force Attack.mp4
50.5 MB
112. Cracking Hashed Passwords.mp4
73 MB
113. Executing a Pass the Hash Attack.mp4
27.8 MB
114. Credential Harvesting and PrivEsc in the Cloud.mp4
55.7 MB
115. Running PACU.mp4
55.8 MB
116. Misconfigured Cloud Assets.mp4
39.8 MB
117. Running CloudSploit.mp4
59.6 MB
118. Resource Exhaustion, Malware Injection and API Attacks.mp4
29.4 MB
119. Side Channel and Direct-To-Origin Attacks.mp4
32.2 MB
12. Scanning TCP and UDP with NMAP.mp4
32.4 MB
120. Additional Cloud Pentesting Tools.mp4
20.8 MB
121. Mobile Device Attacks.mp4
20.2 MB
122. Mobile Device Vulnerabilities.mp4
46.6 MB
123. Mobile Security Tools.mp4
26.6 MB
124. Internet of Things (IoT) Devices.mp4
39.7 MB
125. Data Storage System Vulnerabilities.mp4
34.9 MB
126. SCADA, IIoT and ICS Vulnerabilities.mp4
28.1 MB
127. Virtual Environment Vulnerabilities.mp4
28.4 MB
128. Establishing Persistence.mp4
23.2 MB
129. Lateral Movement.mp4
41.9 MB
13. Identifying Host Attributes with NMAP.mp4
38.2 MB
130. Data Exfiltration.mp4
30.8 MB
131. Covering Your Tracks.mp4
30.1 MB
132. Linux Post Exploit Activities.mp4
63.9 MB
133. Windows Post Exploit Activities.mp4
72.9 MB
134. Analyze a Basic Script.mp4
81.6 MB
135. Scripting Basics.mp4
123.2 MB
136. Assigning Values to Variables.mp4
87.1 MB
137. Operating on Variables with Operators.mp4
77.4 MB
138. Branching Code with Conditionals.mp4
83.9 MB
139. Reapeating Code with Loops.mp4
91.3 MB
14. Using NMAP Scripts.mp4
33.8 MB
140. Handling Errors in Code.mp4
88.7 MB
141. Intro.mp4
16.6 MB
142. Analyzing PING Scripts.mp4
58 MB
143. Downloading Files with Scripts.mp4
23.4 MB
144. Automation with Scripts.mp4
85.5 MB
145. Updating IP Settings with a Script.mp4
37.5 MB
146. NMAP Reports in HTML.mp4
49.2 MB
15. Bypassing Firewalls with NMAP.mp4
34.1 MB
16. Intro to Enumerating Services and Vulnerabilities.mp4