CG数据库 >> Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking的图片1MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch | Duration: 3h 36m | 6.40 GB

Genre: eLearning | Language: English

The Rough Cuts/Sneak Peek program provides early access to Pearson products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including post-production editing.

Table of Contents

Introduction

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Introduction

Lesson 1: Introduction to Enterprise Penetration Testing and Continuous Monitoring

Learning objectives

1.1 Introducing Red Teams and Enterprise Hacking

1.2 Understanding Enterprise Wide Penetration Testing

1.3 Understanding the Difference Between Red and Blue Teams

1.4 Exploring How to Plan and Fund a Red Team

1.5 Surveying Operational Processes and Policies for the Red Team

1.6 Understanding How to Create and Hire the Red Team

1.7 Understanding Red Team Collaboration

Lesson 2: External and Internal Reconnaissance

Learning objectives

2.1 Understanding the Red Team Environment

2.2 Understanding Passive Recon

Lesson 3: Enterprise Social Engineering

Learning objectives

3.1 Surveying Social Engineering Methodologies

3.2 Understanding How to Target Employees

3.3 Exploiting Social Engineering Tools

Lesson 4: Network and Vulnerability Scanning

Learning objectives

4.1 Exploring Network and Vulnerability Scanning Methodologies

4.2 Understanding the Operational Impact of Enterprise-wide Scanning

4.3 Understanding Scanning Tools

4.4 Exploring How to Automate Scans

4.5 Using Shodan and Its API

4.6 Exploring Vulnerability Scanners

4.7 Understanding Binary and Source Code Scanners

4.8 Understanding How to Perform Continuous Monitoring

Lesson 5: Web App Testing

Learning objectives

5.1 Exploring How to Target Hosts

5.2 Exploring Web App Testing Essential Tools

5.3 Understanding Enterprise Application Continuous Testing

Lesson 6: Internal Testing

Learning objectives

6.1 Understanding How to Initially Get on the Network

6.2 Understanding What Hosts to Target and the Scope of the Testing

6.3 Exploring the Hidden Cost of Open Source Software

6.4 Learning How to Host Enterprise Capture the Flag Events

Lesson 7: Privilege Escalation

Learning objectives

7.1 Learning Privilege Escalation Methodologies

7.2 Understanding Lateral Movement

7.3 Surveying Privilege Escalation Essential Tools

Lesson 8: Enterprise Secrets, Post Exploitation, and Data Exfiltration

Learning objectives

8.1 Understanding Persistent Access

8.2 Learning How to Achieve Domain Admin Access

8.3 Understanding How to Compromise User Credentials

8.4 Surveying Password Cracking & Reporting

8.5 Understanding That Domain Admin Is Not the End Goal

8.6 Searching for Sensitive Data

8.7 Understanding Data Exfiltration Techniques

8.8 Understanding How to Cover Your Tracks

Lesson 9 Cloud Services

Learning objectives

9.1 Understanding the Challenge of Testing Cloud Services

9.2 Exploring How to Test in the Cloud

Lesson 10 Reporting & Continuous Evaluation

Learning objectives

10.1 Surveying Final Reports for Transactional Penetration Testing Events

10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring

Summary

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Summary

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking的图片2

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking的图片1
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking的图片2

发布日期: 2018-04-13