Intoduction To Cybersecurity via Penetration Testing
Penetration Testing
Penetration Testing,Cyber Security,IT & Software,Network & Security
Lectures -9
Duration -2.5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
The course is designed to give participants an introduction to cybersecurity(via penetration testing), with the activity being performed in a controlled, and simulated, virtual production environment, and carried out from a (supposedly) independently employed third-party's linux-based perspective. All appliances, servers, and systems have been simulated with virtualization, giving a what-you-see is what-you-get experience. The configurations are carried out real-time, and are an exact depiction of what you would meet/experience in the IT industry, with regards to practices employed by Small-to-Medium Enterprises, and Large-to-Medium Enterprises alike. Participants can also expect comprehensive laboratory practice exercises, and can also opt for PRIVATE lab coaching sessions, which will be conducted in the same virtual production environments, if need be. This is one of the most comprehensive cybersecurity courses participants will undergo, and it is expected they possess(or, at least, have access to) advanced IT-related knowledge-base(and expertise, if need be). Participants can be sure the level of understanding and comprehension that will be conveyed after the course has been completed, will be satisfactory. It is hoped participants will have significant access time to a Personal Computer, and an internet connection, as this will significantly enable them to perform ANY additional research that may be required, in order for them to get the best out of the course. With this level of understanding/comprehension, participants will therefore confidently be able to become unrivaled assets to the respective organisations they are able to achieve gainful employment in/with. The course can also be of significant benefit to participants who want to write professional exams such as OSCP/OSED.
Goals
What will you learn in this course:
- Introduce participants to Cybersecurity via a Penetration Testing-based approach
- Introduce participants to the various tools(and methodologies) employed in such an approach
Prerequisites
What are the prerequisites for this course?
- Significant access time to a Personal Computer, and an internet connection
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction To Cybersecurity via Penetration Testing
9 Lectures
- Introduction 04:23 04:23
- Information Gathering(Session 1) 21:10 21:10
- Information Gathering(Session 2) 24:54 24:54
- Information Gathering(Session 3) 12:20 12:20
- Target(Asset) Identification 02:04 02:04
- Attack Vector(Session 1: Brute Force) 01:02:28 01:02:28
- Attack Vector(Session 2: Phishing e-mail) 22:12 22:12
- Closing Comments 01:57 01:57
- Bonus Class: Remote Access Exploit Via Discovered OS Vulnerability(Eternal Blue) 11:40 11:40
Instructor Details
KESHINRO GBENGA
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now