1.8 Understanding Vulnerabilities, Threats, and Exploits

Security Penetration Testing (The Art of Hacking Series)

Lesson 1: Overview of Ethical Hacking and Penetration Testing

Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.

1.0 Learning objectivesPreview

1.1 Introducing Ethical Hacking and Pen Testing

1.2 Getting Started with Ethical Hacking and Pen Testing

1.3 Understanding the Legal Aspects of Penetration Testing

1.4 Exploring Penetration Testing MethodologiesPreview

1.5 Exploring Penetration Testing and other Cyber Security Certifications

1.6 Building Your Own Lab: Overview

1.7 Building Your Own Lab: VIRL and Operating System Software

1.8 Understanding Vulnerabilities, Threats, and ExploitsPreview

1.9 Understanding the Current Threat Landscape

Lesson 2: Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.

2.0 Learning objectives

2.1 Installing Kali

2.2 Examining Kali Modules and Architecture

2.3 Managing Kali Services

Lesson 3: Network Basics

A network connects computers, mobile phones, peripherals, and even IoT devices. Switches, routers, and wireless access points are the essential networking basics. Through them, devices connected to your network can communicate with one another and with other networks, like the Internet.

1.8 Understanding Vulnerabilities, Threats, and Exploits