MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch | Duration: 3h 36m | 6.40 GB
Genre: eLearning | Language: English
The Rough Cuts/Sneak Peek program provides early access to Pearson products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including post-production editing.
Table of Contents
Introduction
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Introduction
Lesson 1: Introduction to Enterprise Penetration Testing and Continuous Monitoring
Learning objectives
1.1 Introducing Red Teams and Enterprise Hacking
1.2 Understanding Enterprise Wide Penetration Testing
1.3 Understanding the Difference Between Red and Blue Teams
1.4 Exploring How to Plan and Fund a Red Team
1.5 Surveying Operational Processes and Policies for the Red Team
1.6 Understanding How to Create and Hire the Red Team
1.7 Understanding Red Team Collaboration
Lesson 2: External and Internal Reconnaissance
Learning objectives
2.1 Understanding the Red Team Environment
2.2 Understanding Passive Recon
Lesson 3: Enterprise Social Engineering
Learning objectives
3.1 Surveying Social Engineering Methodologies
3.2 Understanding How to Target Employees
3.3 Exploiting Social Engineering Tools
Lesson 4: Network and Vulnerability Scanning
Learning objectives
4.1 Exploring Network and Vulnerability Scanning Methodologies
4.2 Understanding the Operational Impact of Enterprise-wide Scanning
4.3 Understanding Scanning Tools
4.4 Exploring How to Automate Scans
4.5 Using Shodan and Its API
4.6 Exploring Vulnerability Scanners
4.7 Understanding Binary and Source Code Scanners
4.8 Understanding How to Perform Continuous Monitoring
Lesson 5: Web App Testing
Learning objectives
5.1 Exploring How to Target Hosts
5.2 Exploring Web App Testing Essential Tools
5.3 Understanding Enterprise Application Continuous Testing
Lesson 6: Internal Testing
Learning objectives
6.1 Understanding How to Initially Get on the Network
6.2 Understanding What Hosts to Target and the Scope of the Testing
6.3 Exploring the Hidden Cost of Open Source Software
6.4 Learning How to Host Enterprise Capture the Flag Events
Lesson 7: Privilege Escalation
Learning objectives
7.1 Learning Privilege Escalation Methodologies
7.2 Understanding Lateral Movement
7.3 Surveying Privilege Escalation Essential Tools
Lesson 8: Enterprise Secrets, Post Exploitation, and Data Exfiltration
Learning objectives
8.1 Understanding Persistent Access
8.2 Learning How to Achieve Domain Admin Access
8.3 Understanding How to Compromise User Credentials
8.4 Surveying Password Cracking & Reporting
8.5 Understanding That Domain Admin Is Not the End Goal
8.6 Searching for Sensitive Data
8.7 Understanding Data Exfiltration Techniques
8.8 Understanding How to Cover Your Tracks
Lesson 9 Cloud Services
Learning objectives
9.1 Understanding the Challenge of Testing Cloud Services
9.2 Exploring How to Test in the Cloud
Lesson 10 Reporting & Continuous Evaluation
Learning objectives
10.1 Surveying Final Reports for Transactional Penetration Testing Events
10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring
Summary
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking: Summary
发布日期: 2018-04-13