Description

Overview

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

Series Taught By: John Glover

Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Course Details

  • 09:19:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

About this Course

In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.

Your Content Goes Here

Your Content Goes Here

Your Content Goes Here

Course Outline

Top of Form

PENETRATION TESTING

  • Overview
  • Platforms And Basic Skills
  • Remote Shells
  • Scanning And Enumeration
  • Buffer Overflows
  • Buffer Overflows Part 2
  • Buffer Overflows Part 3
  • Buffer Overflows Part 4
  • Web Apps Cross Site Scripting
  • Web Apps Remote File Inclusion (RFI)
  • Web Apps Local File Inclusion (LFI)
  • File Transfer Fun
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • SQL Injection
  • SQL Injection Part 2
  • Password Cracking And Attacks
  • Password Cracking And Attacks Part 2
  • Port Redirection