-
Book Overview & Buying
-
Table Of Contents
Pentesting Fundamentals for Beginners
By :
Pentesting Fundamentals for Beginners
By:
Overview of this book
Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know what pentesting framework would be used to meet a specific condition and what information should be delivered in an executive summary. You should know how to scope an assessment and identify what document is used for what purpose and the OWASP Top 10 and identify the hacking methodology used to exploit each one. These are just a few fundamentals that remain constant from one ethical hacking exam.
This course provides you with the fundamental knowledge every ethical hacker is expected to know. Throughout this course, you will learn about cybersecurity tools, reverse shells, scripting basics, identifying output, and what commands were used to generate the output.
This course will help you identify security tools and ethical hacking techniques, exploit web application vulnerabilities, appropriate documentation for starting and finalizing a pentest, correct reporting procedures, and appropriately exploit for a given vulnerability.
By the end of this course, you will have learned the fundamentals of pentesting, and renewed your confidence, and recharged your cyber security career with ease.
All the resource files are added to the GitHub repository at: https://github.com/PacktPublishing/Pentesting-Fundamentals-for-Beginners
Table of Contents (13 chapters)
Introduction to the Course
Virtual Lab Build
Documentation
Penetration Testing Frameworks
Nmap - Network Discovery
OpenVAS - Vulnerability Scanning
Information Gathering
Reverse Shells and Persistent Connections
Privilege Escalation
OWASP Top 10 Mitigations
Web Applications Testing
Compiling Exploit Code