Complete Guide to Penetration Testing

Posted By: IrGens

Complete Guide to Penetration Testing
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 7h 16m | 936 MB
Instructor: Malcolm Shore

In this comprehensive course, cybersecurity expert Malcolm Shore provides training in the three key areas of scripting—bash, Python, Powershell—and highlights the use of Kali Linux. Explore the use of basic tools for enumeration, vulnerability detection, and file transfer. Go over testing the different environments that a pen tester will encounter, such as web, cloud, active directory, and wireless. Learn about password brute force and cracking techniques, code injection through SQL, and the use of web and command shells. Discover how the key tools that come with Kali can be used to run exploits and how exploits work. Plus, go over the basics of malware reverse engineering and analysis.