PenTesting for Physical Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 14-video course explores physical penetration testing, and how to test a business's infrastructure, including IT assets, its data, people, and physical security to locate any exploitable vulnerabilities. In this course, you will learn why lockpicking is essential in cybersecurity, and you will examine different types of locks and lockpick tools. This course demonstrates several types of penetrations, including EM (electromagnetic security vulnerabilities), dumpster diving, and tailgating, and how to protect against these attacks. You will learn about penetration testing types, including network services, web and client applications, Cloud penetration, penetration testing of wireless networks, and social engineering. Learners will explore several penetration tools, including Kali Linux, which comes with tool such as Nmap, Wireshark, and John the Ripper; the Aircrack suite; OpenVas, and several others. You will learn about web app security testing methodologies. Learners will observe the elements of a successful report, and how to document penetration testing results. Finally, this course demonstrates practicing testing skills by using Grier Demo website.



Expected Duration (hours)
1.1

Lesson Objectives

PenTesting for Physical Security

  • discover the key concepts covered in this course
  • describe the importance of physical penetration testing and why organizations must perform penetration testing
  • describe the steps necessary to implement a physical penetration testing program and the phases of penetration testing
  • identify different lock pick tools and why lock picking is important in cybersecurity
  • describe how to protect sensitive data with security testing and the five penetration testing rules of engagement
  • describe penetration testing tools that are used by professional hackers
  • identify the types of penetration testing and common terminology
  • describe electromagnetic security vulnerabilities and devices that can help prevent this method of attack
  • describe the purpose and results of dumpster diving and how to protect against this form of attack
  • identify how to recognize and prevent tailgating and recognize the risks that it exposes
  • describe how to document the findings of physical penetration testing and the key components of the report
  • identify web application security testing methodologies and the five stages of OPSEC
  • perform penetration testing using the Gruyere demo web site
  • summarize the key concepts covered in this course
  • Course Number:
    it_sopyptdj_01_enus

    Expertise Level
    Intermediate