Penetration Testing Explained

Penetration Testing Explained

Penetration Testing Explained

Learn about the Penetration Testing concepts in detail

Language: english

Note: 4.5/5 (5 notes) 1,176 students  New course 

Instructor(s): Revanth Vemireddy

Last update: 2022-06-19

What you’ll learn

  • Learn about the rules of engagement of Penetration Testing
  • Learn about the types of teams in Penetration Testing
  • Learn about the different stages/phases of Penetation Testing
  • Learn about the different types of Penetration Testing

 

Requirements

  • No programming experience required

 

Description

In this course we’ll cover the concepts of penetration testing in detail.


Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

…………………………………………………………………………………………………………………………………………………………………………………………………………


In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.


………………………………………………………………………………………………………………………………………………………………………………………………………………


In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.


They are as follows:

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting


………………………………………………………………………………………………………………………………………………………………………………………………………………


Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.


…………………………………………………………………………………………………………………………………………………………………………………………………………


In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.


………………………………………………………………………………………………………………………………………………………………………………………………………………


In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.


They are as follows:


They are as follows:

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting


………………………………………………………………………………………………………………………………………………………………………………………………………………


Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.


…………………………………………………………………………………………………………………………………………………………………………………………………………


In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.


………………………………………………………………………………………………………………………………………………………………………………………………………………


In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.


They are as follows:


They are as follows:

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting


………………………………………………………………………………………………………………………………………………………………………………………………………………


Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

 

Who this course is for

  • Those who’re curious about Ethical Hacking.
  • Those who’re curious about Information Security

 

Course content

  • Penetration Testing Concepts
    • Introduction to Pen Testing ,Types of Pen Testing & Rules of Engagement
  • Phases of Pen-Testing
    • Information Gathering
    • Scanning
    • Exploitation
    • Post exploitation/ maintaining access
    • Reporting

 

Penetration Testing ExplainedPenetration Testing Explained

 

Don’t miss any coupons by joining our Telegram group 

Udemy Coupon Code 100% off | Udemy Free Course | Udemy offer | Course with certificate