Penetration Testing Fundamentals Pearson uCertify

Gain hands-on expertise in the practical concepts of penetration testing with the Penetration Testing Fundamentals course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The course and labs cover all the concepts, terminology, challenges, and provide skills in Metaspoilts, write or customize sophisticated Metaspoilts exploits, general hacking techniques and knowledge, and some additional pen testing concepts.

Here's what you will get

Lessons
Lessons
19+
Quizzes
112+
Flashcards
120+
Glossary of terms
120+
TestPrep
Pre-assessment Questions
100+
Post-Assessment Questions
100+
Lab
Performance lab
Learn the real world skills using Live Labs.
58+
Video Tutorials
Video tutorials
109+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
109+
Hours
12:10+

Here's what you will learn

  • What Is Penetration Testing?
  • Terminology
  • Methodologies
  • Ethical Issues
  • Legal Issues
  • Certifications
  • Careers in Penetration Testing
  • Building Your Skillset
  • Summary
  • Test Your Skills
  • PCI DSS
  • NIST 800-115
  • National Security Agency InfoSec Assessment Methodology (NSA-IAM)
  • PTES
  • CREST (UK)
  • A Synthesis (Putting Standards Together into a Single Unified Approach)
  • Related Standards
  • Other Standards
  • Summary
  • Test Your Skills
  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Password Crackers
  • Steganography
  • Cryptanalysis
  • Learning More
  • Summary
  • Test Your Skills
  • Passive Scanning Techniques
  • Active Scanning Techniques
  • Wireshark
  • Maltego
  • Other OSINT Tools
  • Summary
  • Test Your Skills
  • Viruses
  • Trojan Horses
  • Other Forms of Malware
  • Creating Malware
  • Summary
  • Test Your Skills
  • Windows Details
  • Windows Password Hashing
  • Windows Hacking Techniques
  • Windows Scripting
  • Windows Password Cracking
  • Detecting Malware in Windows
  • Cain and Abel
  • Summary
  • Test Your Skills
  • Web Technology
  • Specific Attacks on Websites
  • Tools
  • Summary
  • Test Your Skills
  • Vulnerabilities
  • Packet Capture
  • Network Scanners
  • Wireless Scanners/Crackers
  • General Scanners
  • Web Application Scanners
  • Cyber Threat Intelligence
  • Summary
  • Test Your Skills
  • Linux History
  • Linux Commands
  • Directories
  • Graphical User Interface
  • Summary
  • Test Your Skills
  • More on the Linux OS
  • Linux Firewall
  • Syslogd
  • Scripting
  • Linux Passwords
  • Linux Hacking Tricks
  • Summary
  • Test Your Skills
  • Kali Linux History
  • Kali Basics
  • Kali Tools
  • Summary
  • Test Your Skills
  • Wi-Fi Testing
  • Social Engineering
  • DoS
  • Summary
  • Test Your Skills
  • Background on Metasploit
  • Getting Started with Metasploit
  • Basic Usage of msfconsole
  • Scanning with Metasploit
  • How to Use Exploits
  • Exploit Examples
  • Post Exploits
  • Summary
  • Test Your Skills
  • Meterpreter and Post Exploits
  • msfvenom
  • More Metasploit Attacks
  • Summary
  • Test Your Skills
  • Getting Started
  • Basic Ruby Scripting
  • Summary
  • Test Your Skills
  • The API
  • Getting Started
  • Examine an Existing Exploit
  • Extending Existing Exploits
  • Writing Your First Exploit
  • Summary
  • Test Your Skills
  • Conferences
  • Dark Web
  • Certification and Training
  • Cyber Warfare and Terrorism
  • Nation State Actors
  • Summary
  • Test Your Skills
  • Wireless Pen Testing
  • Mainframe and SCADA
  • Mobile Pen Testing
  • Summary
  • Test Your Skills
  • Pen Test Outline
  • Report Outline
  • Summary

Hands on Activities (Labs)

  • Reviewing an authorization letter for penetration testing
  • Reviewing a confidential penetration report
  • Using OpenSSL to create a public/private key pair
  • Observe an SHA-Generated Hash Value
  • Observe an MD5-Generated Hash Value
  • Using Pwdump7 and Cain and Abel
  • Using DeepSound
  • Detecting Phishing Site using Netcraft
  • Searching with builtwith.com
  • Observing a website using archive.org 
  • Using Shodan
  • Nmap Live systems Scan
  • Nmap OS Scan
  • Scanning a port using nmap
  • Enumerating Data using enum4linux
  • Using Wireshark
  • Using Maltego
  • Causing a Darkcomet Trojan Infection
  • Creating a trojan File
  • Scanning malware using antivirus
  • Covering Tracks
  • Using The net Command
  • Windows Password Cracking using ophcrack
  • Linux Password Cracking using John the Ripper
  • Exploiting a Website using SQL Injection
  • Attacking a Website using XSS Injection
  • Using Burp Suite
  • Using BeEF
  • Reviewing the Top 10 OWASP Attacks
  • Consulting a Vulnerability Database
  • Capture a Packet using tcpdump
  • Grabbing User Credentials using Wireshark
  • Scanning a Network using LANHelper
  • Using MBSA
  • Conducting vulnerability scanning using Nessus
  • Conducting Web Application Vulnerability Scanning using OWASP ZAP
  • Using Basic Linux Commands
  • Using the iptables Command to Create a Personal Firewall in Linux
  • Writing bash shell Script
  • Installing Kali Linux
  • Using Sparta
  • DoS Attacks with SYN Flood
  • Simulating DDoS Attack
  • Exploiting Windows 7 using Metasploit
  • Searching vulnerability using metasploit
  • Grab a Screenshot of a Target Machine using Metasploit
  • Scanning Ports using Metasploit
  • Causing a Darkcomet trojan infection
  • Create Unlimited Folders in a Victim Machine using Metasploit
  • Hide a Remote Machine Disk using Metasploit
  • Hacking Windows using Metasploit
  • Enabling a Keylogger in a Target Machine
  • Enabling Payload on a Target Machine using Metasploit
  • Getting persistence session of metasploit
  • Creating ruby script
  • Creating ruby script for arithmetic operations
  • Creating ruby script for loops
  • Creating ruby script to run commands

Customer Testimonials

best
It was a pleasure to review the uCertify PenTest Fundamental Course. I strongly recommend this course for people who want to become a penetration tester as a starting point. I heartily appreciated to give me a chance to review one of the uCertify course.
Yukyung Jung
pearson-pentest-complete pearson-pentest-complete
pearson-pentest-complete
Penetration Testing Fundamentals Pearson uCertify
ISBN : 9781616910297
Rating :
(16)