Book Image

Getting Started with Pentesting [Video]

By : Tajinder Kalsi
Book Image

Getting Started with Pentesting [Video]

By: Tajinder Kalsi

Overview of this book

<p><span id="description" class="sugar_field">With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems. </span></p> <p><span id="description" class="sugar_field">The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills. </span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">Step-by-step instructions with challenges designed to test your skills and impart proficiency</span></span></p>
Table of Contents (5 chapters)
Chapter 2
Introduction to Penetration Testing
Content Locked
Section 2
Pentesting Methodology
As a Pentester, it should be a practice to follow well-known standards and methodologies to have the maximum benefit from an activity. In this video, we will discuss about the two most well-known standards—OWASP and PTES—to get in line with industry standards. - Get introduced to the OWASP methodology - Learn about the PTES methodology phase-wise