Introduction to Ethical Hacking and Penetration Testing Live Training
This is a collection of supplemental resources and exercises for the Pearson training "Introduction Ethical Hacking and Penetration Testing" live training authored and delivered by Omar Santos and delivered through Safari Books Online.
The author also has created a series of penetration testing / ethical hacking video courses called The Art of Hacking Series.
Training Summary from Safari
Now is the time to enter the field of cyber security. The number of cyber-attacks continue to rise. Demand for safe and secure data and other concerns mean that companies need professionals to keep their information safe. If you are starting your cyber career, seeking your Certified Ethical Hacking or Offensive Security Certified Professional (OSCP) Certification, or just interested in learning more about cyber security, this two-day training session is a great place to start.
With live discussions, demos, whiteboard instruction and screencasts this training course will introduce you to the basics of ethical hacking or penetration testing. No prior experience is needed. Omar Santos, best-selling security author, speaker and Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations will introduce you to security concepts and then walk you through a complete a penetration test, from beginning to end. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first-hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture.
This training includes live discussions, demos, whiteboard instruction and screencasts. You will benefit from expert insights of the methodologies used to assess and compromise a network. You will also learn about the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. In this training we will go over several tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you’ll different best practices on how to write a penetration testing report.
Helpful Resources Prior to Taking the Live Training:
- Security Penetration Testing The Art of Hacking Series LiveLessons (video)
- Wireless Networks, IoT, and Mobile Devices Hacking (video)
- Security Fundamentals (video)
Agenda and Topics
DAY ONE
- Lesson 1: Overview of Ethical Hacking and Penetration Testing
- Lesson 2: Introduction to Kali Linux
- Lesson 3: Passive and Active Reconnaissance
- Lesson 4: Introduction to Hacking Web Applications
- Lesson 5: Introduction to Hacking User Credentials
- Lesson 6: Introduction to Hacking Databases
DAY TWO
- Lesson 7: Introduction to Hacking Networking Devices
- Lesson 8: Fundamentals of Wireless Hacking
- Lesson 9: Introduction to Buffer Overflows
- Lesson 10: Fundamentals of Evasion and Post Exploitation Techniques
- Lesson 11: Introduction to Social Engineering
- Lesson 12: How to Write Penetration Testing Reports
About the Author and Instructor:
Omar Santos, is a Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a Technical Leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
Omar is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.
Omar is the author of several books and numerous whitepapers, articles, and security configuration guidelines and best practices. He has also delivered numerous technical presentations at many conferences and to Cisco customers and partners, in addition to many C-level executive presentations to many organizations.
Twitter: https://twitter.com/santosomar
LinkedIn: https://www.linkedin.com/in/santosomar