Description
Overview
This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.
Series Taught By: John Glover
Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More
Course Details
- 09:19:00 Hours
- 12 Months Access
- Presented by highly qualified, industry leading experts
About this Course
In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.
Your Content Goes Here
Your Content Goes Here
Your Content Goes Here
Course Outline
Top of Form
PENETRATION TESTING
- Overview
- Platforms And Basic Skills
- Remote Shells
- Scanning And Enumeration
- Buffer Overflows
- Buffer Overflows Part 2
- Buffer Overflows Part 3
- Buffer Overflows Part 4
- Web Apps Cross Site Scripting
- Web Apps Remote File Inclusion (RFI)
- Web Apps Local File Inclusion (LFI)
- File Transfer Fun
- Windows Privilege Escalation
- Linux Privilege Escalation
- SQL Injection
- SQL Injection Part 2
- Password Cracking And Attacks
- Password Cracking And Attacks Part 2
- Port Redirection