Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson

Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson
English | Size: 512.58 MB
Category: Tutorial


Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using metasploit, you’ll learn to use metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. [Read more…]

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016
English | Size: 485.56 MB
Category: Security


SEC542.1: Web Penetration Testing and Ethical Hacking: Introduction and Information Gathering
SEC542.2: Web Penetration Testing and Ethical Hacking: Configuration, Identity, and Authentication Testing…. [Read more…]

Lynda.com Ethical Hacking Penetration Testing Tutorial

Ethical Hacking Penetration Testing Tutorial
English | Size:177.09 MB
Category:Tutorial


You’ve done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of “pen” tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider’s perspective to your IT security efforts. [Read more…]

O’Reilly – Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
English | Size: 0.98 GB
Category: Infinite Skills


Penetration Testing With the Metasploit Framework Training Video

An essential requirement for protecting any organization’s computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities. [Read more…]

eLearnSecurity – Mobile Application Security and Penetration Testing – MASPT v2

eLearnSecurity – Mobile Application Security and Penetration Testing – MASPT v2
English | Size:
Category:


Course at a glance:
Start from iOS and Android architectures basics
Exposes Android and iOS vulnerabilities in-depth
Covers mobile OSs security mechanisms and implementations
Covers Mobile applications reverse engineering
In depth mobile applications static and dynamic analysis
Practice on real world mobile applications
Build your own home lab on mobile application security
Provides you the skills necessary to peform Penetration tests of mobile applications
Covers: APKTool, Dex2Jar, GDB Debugger, Cycript and many others
After obtaining the eMAPT certification qualifies you for 40 CPE [Read more…]

Penetration Testing Automation Using Python and Kali Linux | Pluralsight

Penetration Testing Automation Using Python and Kali Linux | Pluralsight

English | Size: 383.99 MB (402,638,126 Bytes)
Category: Tutorial


Get a good understanding on how to use Python to automate your web penetration testing scenarios. In this course, Penetration Testing Automation Using Python and Kali Linux, you’ll learn how to start automating your penetration testing tasks using Python and Kali Linux. First, you’ll learn about information gathering automation. Next, you’ll learn about network scanning automation. Finally, you’ll learn about vulnerabilities assessment automation. By the end of this course, you’ll be able to develop your own automated scanner for gathering information, scanning the network, and conducting an automated vulnerability assessment. [Read more…]

CBT Nuggets – Penetration Testing with Linux Tools

CBT Nuggets – Penetration Testing with Linux Tools

English | Size: 2.59 GB (2,776,428,235 Bytes)
Category: CBTs


This course with Keith Barker offers both BackTrack and Kali Linux training, which provides easy access to an extensive collection of security-related tools ranging from port scanners to Security Audit.

This course with Keith Barker offers both BackTrack and Kali Linux training, which provides easy access to an extensive collection of security-related tools ranging from port scanners to Security Audit. [Read more…]

[Cybrary] Penetration Testing and Ethical Hacking

[Cybrary] Penetration Testing and Ethical Hacking
English | Size: 2.42 GB (2,601,887,118 bytes )
Category: Tutorial


Get started with Ethical Hacking by viewing our course videos below. If you are looking to become a pen tester, this course explains the fundamentals necessary for advancement.
[Read more…]

Web Hacking, Web Security and Penetration’s Testing

Web Hacking, Web Security and Penetration’s Testing

English | Size: 421.57 MB (442,044,161 Bytes)
Category: CBTs


Web Security Testing Tutorial / Course from Beginners Level for making sure website being tested in not vulnerable.

Once website is compromised it not only indexing is stooped by search engines by a large setback to it customers.

This course will prepare to become Penetration tester to make sure website is not vulnerable to attackes. Course teaches you how to use the webtools so that you can test the webportals as a tester.
[Read more…]

Penetration Testing with Metasploit Ethical hacking stream

Penetration-Testing-with-Metasploit-Ethical-hacking-stream

English | Size: 804.83 MB (843,928,015 Bytes)
Category: CBTs


From Wikipedia: The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework. [Read more…]