Learn your way! Get started

Security Analyst, Part 3 of 4: Penetration Testing

with expert Don Bowers


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 7/28/2017
Level Beginner
Runtime 1h 14m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course focuses on Penetration testing. It starts off with how to create a plan, and execute deliverables. Next, it covers the planning phase as well as developing a team of testers. Finally, it goes through the penetration testing checklist for carrying out a successful penetration test.

Prerequisites

In order to maximize you leaning experience when taking this course, the following prerequisites are highly recommended: Security + Certification, knowledge of CEH (Certified Ethical Hacker), knowledge of CHFI (Computer Hacking Forensic Investigator) and the CBK (Common Body of Knowledge) associated with the CISSP and CISA certifications are also very helpful.

Meet the expert

Don Bowers has been in the computer industry for over 36 years as a database programmer and an information systems and security analyst.  Don’s primary focus over the last 10 years has been in the area of information security and digital forensics.  Don currently serves as an Assistant Professor and the Program Chair for the Cybersecurity program at the College of Western Idaho.  As well as being an associate professor Don also holds the distinction of being a Certified EC-Council Instructor.  Don holds several industry certifications including MCITP Enterprise, MCSE + Security, CISSP, CISA, CEH, CHFI, ECSA (EC-Council Security Analysis), LPT (Licensed Penetration Tester) and ACE (AccessData Certified Examiner).

Course outline



Penetration Testing

Penetration Test Plan (26:54)
  • Introduction (00:32)
  • Penetration Test Plan and Purpose (03:29)
  • Content of a Test Plan (06:39)
  • Test Plan Identifiers (08:14)
  • Test Deliverables (07:38)
  • Summary (00:20)
Penetration Test Phases (25:16)
  • Introduction (00:21)
  • Penetration Testing Planning Phases (07:50)
  • Schedule (03:59)
  • Develop a Well-Qualified Team of Testers (04:25)
  • Hardware and Software Requirements (08:16)
  • Summary (00:22)
Penetration Test Checklist (22:03)
  • Introduction (00:18)
  • Pre-Penetration Testing Checklist 1-5 (03:44)
  • Pre-Penetration Testing Checklist 6-11 (04:25)
  • Pre-Penetration Testing Checklist 12-17 (03:42)
  • Pre-Penetration Testing Checklist 18-23 (03:42)
  • Pre-Penetration Testing Checklist 24-29 (02:09)
  • Pre-Penetration Testing Checklist 30-34 (01:30)
  • Pre-Penetration Testing Checklist 35-40 (02:08)
  • Summary (00:21)