Penetration Testing Fundamentals Pearson uCertify Labs

Gain hands-on expertise in penetration techniques with the Penetration Testing Fundamentals performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The course and labs all the concepts, terminology, challenges, and skills you'll need to be effective such as Metaspoilts, write or customize sophisticated Metaspoilts exploits, ethical hacking techniques and knowledge, and some additional pen testing concepts.

Here's what you will get

Lab
Performance lab
Learn the real world skills using Live Labs.
56+

Here's what you will learn

Hands on Activities (Labs)

  • Reviewing an authorization letter for penetration testing
  • Reviewing a confidential penetration report
  • Using OpenSSL to create a public/private key pair
  • Observe an MD5-Generated Hash Value
  • Observe an SHA-Generated Hash Value
  • Using Pwdump7 and Cain and Abel
  • Using DeepSound
  • Detecting Phishing Site using Netcraft
  • Searching with builtwith.com
  • Observing a website using archive.org 
  • Using Shodan
  • Nmap Live systems Scan
  • Nmap OS Scan
  • Scanning a port using nmap
  • Enumerating Data using enum4linux
  • Using Wireshark
  • Using Maltego
  • Causing a Darkcomet Trojan Infection
  • Creating a trojan File
  • Scanning malware using antivirus
  • Covering Tracks
  • Using The net Command
  • Windows Password Cracking using ophcrack
  • Linux Password Cracking using John the Ripper
  • Exploiting a Website using SQL Injection
  • Attacking a Website using XSS Injection
  • Using Burp Suite
  • Using BeEF
  • Reviewing the Top 10 OWASP Attacks
  • Consulting a Vulnerability Database
  • Capture a Packet using tcpdump
  • Grabbing User Credentials using Wireshark
  • Scanning a Network using LANHelper
  • Using MBSA
  • Conducting vulnerability scanning using Nessus
  • Conducting Web Application Vulnerability Scanning using OWASP ZAP
  • Using Basic Linux Commands
  • Using the iptables Command to Create a Personal Firewall in Linux
  • Writing bash shell Script
  • Installing Kali Linux
  • Using Sparta
  • DoS Attacks with SYN Flood
  • Searching vulnerability using metasploit
  • Grab a Screenshot of a Target Machine using Metasploit
  • Scanning Ports using Metasploit
  • Exploiting Windows 7 using Metasploit
  • Create Unlimited Folders in a Victim Machine using Metasploit
  • Hide a Remote Machine Disk using Metasploit
  • Hacking Windows using Metasploit
  • Enabling a Keylogger in a Target Machine
  • Enabling Payload on a Target Machine using Metasploit
  • Getting persistence session of metasploit
  • Creating ruby script
  • Creating ruby script for arithmetic operations
  • Creating ruby script for loops
  • Creating ruby script to run commands
pearson-pentest-lab_pro pearson-pentest-lab_pro
pearson-pentest-lab
Penetration Testing Fundamentals Pearson uCertify Labs
ISBN : 9781616910587
Rating :
(16)