Oct

14

2020

Ethical Hacking: Penetration Testing - lynda

Laser 14 Oct 2020 03:34 LEARNING » e-learning - Tutorial

Ethical Hacking: Penetration Testing - lynda
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 48000 Hz
Language: English | SRT | Size: 190 MB | Duration: 1h 26m

You've done everything you can to logically secure your systems, along with layering in user education and providing physical security.

However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. Penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in perfog a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts.

Topics include:

Auditing security mechanisms

Locating vulnerabilities

Exploring types of penetration testing

Pen testing techniques

Following a pen-testing blueprint

Testing physical, wireless, website, database, and email security

Outsourcing penetration testing



DOWNLOAD
uploadgig



rapidgator


nitroflare

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis