Practical Pentesting: featuring Brad Stine

Product type

Practical Pentesting: featuring Brad Stine

Stone River eLearning LLC
Logo Stone River eLearning LLC

Need more information? Get more details on the site of the provider.

Description

In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through the lens of Brad's experience as a Pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.

There are several pentesting platforms available in the market that can assist in conducting penetration testing and vulnerability assessment…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: CompTIA A+ / Network+ / Security+, Internet Security, E-commerce, IT Security, and Cisco.

In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through the lens of Brad's experience as a Pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.

There are several pentesting platforms available in the market that can assist in conducting penetration testing and vulnerability assessments. These platforms provide a range of tools and functionalities to identify and exploit vulnerabilities in computer systems, networks, and applications

A typical penetration testing engagement consists of several stages or phases that help guide the assessment process. These stages ensure a systematic and comprehensive approach to identifying vulnerabilities and assessing the security posture of the target system. The specific names and order of the stages may vary depending on the methodology followed by the pentester or the organization conducting the assessment.

The course includes Blue Team pentesting, also known as defensive security testing or purple teaming, is a practice where a team of security professionals simulates real-world attacks on a company's systems and infrastructure to evaluate and improve the organization's defensive capabilities. Unlike traditional penetration testing (red teaming), which focuses on identifying vulnerabilities and exploiting them, blue team pentesting is centered around assessing and enhancing the effectiveness of an organization's security controls and incident response processes.

There are no reviews yet.
    Share your review
    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.