Book Image

Penetration Testing for Highly-Secured Environments [Video]

By : Aaron Johns
Book Image

Penetration Testing for Highly-Secured Environments [Video]

By: Aaron Johns

Overview of this book

<p>The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.</p> <p>Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.</p> <p>The goal of this video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more.</p> <p>To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.</p> <p>If you are looking to practice your network security skills as a penetration testing, through exploitation techniques and strategies, then this video course is for you.</p> <h1>Style and Approach</h1> <p>Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done.</p> <p>This video course takes a progressive approach by first unravelling security techniques and then applying these techniques in a fictional environment. It is thoroughly educational and gives users the opportunity to test their skills.</p>
Table of Contents (8 chapters)
Chapter 8
Writing a Penetration Testing Report
Content Locked
Section 5
Final Statement by the Author
Recommendations given by the author