Pen Testing: Advanced Pen Testing Techniques


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore advanced penetration testing tools and techniques used to find vulnerabilities, sniff network traffic, deal with cryptography, and crack passwords in this 14-video course. Learners will discover common techniques used to find weaknesses in both Linux and Windows-based systems. Key concepts covered here include finding vulnerability by using scanners and other techniques; how to capture and analyze network traffic with Wireshark; and learning about wireless security technologies, such as WEP, WPA/2/3, and their vulnerabilities. Continue by learning about cryptography and its four goals; learning to differentiate between symmetric and asymmetric cryptography; and learning how to choose a password cracking technique. Next, learn to differentiate between malware types and recognize the consequences of using targeted malware; learn to differentiate between scanning and enumeration; and learn the benefits of using Python to build scripts and deliver exploits. Then perform Linux privilege escalation with a penetration tester; perform Windows privilege escalation to exploit a Windows system by using the AlwaysInstallElevated technique; and use PowerShell to perform pen testing tasks such as reporting on all USB devices installed.



Expected Duration (hours)
1.4

Lesson Objectives

Pen Testing: Advanced Pen Testing Techniques

  • discover the key concepts covered in this course
  • describe how to find a vulnerability using scanners and other techniques
  • capture and analyze network traffic using Wireshark
  • recognize wireless security technologies such as WEP, WPA/2/3, and the vulnerabilities they have that could be exploited
  • describe cryptography and its four goals
  • differentiate between symmetric and asymmetric cryptography
  • recognize how to choose a password cracking technique
  • differentiate between malware types and recognize some of the consequences of using targeted malware
  • differentiate between scanning and enumeration
  • recognize the benefits of using Python to build scripts and deliver exploits
  • perform Linux privilege escalation via writeable /etc/passwd file
  • perform Windows privilege escalation to exploit a Windows system using the AlwaysInstallElevated technique
  • use PowerShell to perform pen testing tasks such as reporting on all USB devices installed, killing processes, and using PSDrive to view objects in Windows 
  • summarize the key concepts covered in this course
  • Course Number:
    it_soadptdj_01_enus

    Expertise Level
    Expert