1.4 Exploring Penetration Testing Methodologies
Security Penetration Testing (The Art of Hacking Series)
Lesson 1: Overview of Ethical Hacking and Penetration Testing
Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.
1.0 Learning objectivesPreview
1.1 Introducing Ethical Hacking and Pen Testing
1.2 Getting Started with Ethical Hacking and Pen Testing
1.3 Understanding the Legal Aspects of Penetration Testing
1.4 Exploring Penetration Testing MethodologiesPreview
1.5 Exploring Penetration Testing and other Cyber Security Certifications
1.6 Building Your Own Lab: Overview
1.7 Building Your Own Lab: VIRL and Operating System Software
1.8 Understanding Vulnerabilities, Threats, and ExploitsPreview
1.9 Understanding the Current Threat Landscape
Lesson 2: Kali Linux
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.
2.0 Learning objectives
2.1 Installing Kali
2.2 Examining Kali Modules and Architecture
2.3 Managing Kali Services
Lesson 3: Network Basics
A network connects computers, mobile phones, peripherals, and even IoT devices. Switches, routers, and wireless access points are the essential networking basics. Through them, devices connected to your network can communicate with one another and with other networks, like the Internet.
1.4 Exploring Penetration Testing Methodologies