Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 3h 36m | 1.50 GB

This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture.

Table of Contents

01 Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking – Introduction
02 Learning objectives
03 1.1 Introducing Red Teams and Enterprise Hacking
04 1.2 Understanding Enterprise Wide Penetration Testing
05 1.3 Understanding the Difference Between Red and Blue Teams
06 1.4 Exploring How to Plan and Fund a Red Team
07 1.5 Surveying Operational Processes and Policies for the Red Team
08 1.6 Understanding How to Create and Hire the Red Team
09 1.7 Understanding Red Team Collaboration
10 Learning objectives
11 2.1 Understanding the Red Team Environment
12 2.2 Understanding Passive Recon
13 Learning objectives
14 3.1 Surveying Social Engineering Methodologies
15 3.2 Understanding How to Target Employees
16 3.3 Exploiting Social Engineering Tools
17 Learning objectives
18 4.1 Exploring Network and Vulnerability Scanning Methodologies
19 4.2 Understanding the Operational Impact of Enterprise-wide Scanning
20 4.3 Understanding Scanning Tools
21 4.4 Exploring How to Automate Scans
22 4.5 Using Shodan and Its API
23 4.6 Exploring Vulnerability Scanners
24 4.7 Understanding Binary and Source Code Scanners
25 4.8 Understanding How to Perform Continuous Monitoring
26 Learning objectives
27 5.1 Exploring How to Target Hosts
28 5.2 Exploring Web App Testing Essential Tools
29 5.3 Understanding Enterprise Application Continuous Testing
30 Learning objectives
31 6.1 Understanding How to Initially Get on the Network
32 6.2 Understanding What Hosts to Target and the Scope of the Testing
33 6.3 Exploring the Hidden Cost of Open Source Software
34 6.4 Learning How to Host Enterprise Capture the Flag Events
35 Learning objectives
36 7.1 Learning Privilege Escalation Methodologies
37 7.2 Understanding Lateral Movement
38 7.3 Surveying Privilege Escalation Essential Tools
39 Learning objectives
40 8.1 Understanding Persistent Access
41 8.2 Learning How to Achieve Domain Admin Access
42 8.3 Understanding How to Compromise User Credentials
43 8.4 Surveying Password Cracking & Reporting
44 8.5 Understanding That Domain Admin Is Not the End Goal
45 8.6 Searching for Sensitive Data
46 8.7 Understanding Data Exfiltration Techniques
47 8.8 Understanding How to Cover Your Tracks
48 Learning objectives
49 9.1 Understanding the Challenge of Testing Cloud Services
50 9.2 Exploring How to Test in the Cloud
51 Learning objectives
52 10.1 Surveying Final Reports for Transactional Penetration Testing Events
53 10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring
54 Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking – Summary