• Post category:Udemy (June 2022)
  • Reading time:4 mins read


Learn about the Penetration Testing concepts in detail

What you will learn

Learn about the rules of engagement of Penetration Testing

Learn about the types of teams in Penetration Testing

Learn about the different stages/phases of Penetation Testing

Learn about the different types of Penetration Testing

Description

In this course we’ll cover the concepts of penetration testing in detail.

Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

…………………………………………………………………………………………………………………………………………………………………………………………………………

In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.

………………………………………………………………………………………………………………………………………………………………………………………………………………

In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.

They are as follows:

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting

………………………………………………………………………………………………………………………………………………………………………………………………………………

Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

…………………………………………………………………………………………………………………………………………………………………………………………………………

In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.

………………………………………………………………………………………………………………………………………………………………………………………………………………

In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.

They are as follows:

They are as follows:


Subscribe to latest coupons on our Telegram channel.

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting

………………………………………………………………………………………………………………………………………………………………………………………………………………

Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

…………………………………………………………………………………………………………………………………………………………………………………………………………

In the First section, We will learn what penetration testing is in the first place? why conduct it ? different Types of penetration testing? and Rules of Engagement (RoE Document).

In types of penetration testing we’ll learn about the Application penetration test, Network penetration test, Physical penetration test, and IoT/Mobile penetration test. We will also learn about the scope of penetration testing – Black box testing, White box testing & Gray box testing in the Rules of Engagement.

………………………………………………………………………………………………………………………………………………………………………………………………………………

In Section Two, we will learn about the different phases of penetration testing. There are five phases in penetration testing.

They are as follows:

They are as follows:

Information gathering

Scanning

Exploitation

Post Exploitation

Reporting

………………………………………………………………………………………………………………………………………………………………………………………………………………

Note: This course does not cover any utilization of cyber security tools. This lecture only covers the concepts of Penetration testing.

English
language

Content

Penetration Testing Concepts

Introduction to Pen Testing ,Types of Pen Testing & Rules of Engagement

Phases of Pen-Testing

Information Gathering
Scanning
Exploitation
Post exploitation/ maintaining access
Reporting