Introduction
Testing an organization's defenses
()
Getting the most out of this course
()
Hacking ethically
()
1. Organizational Penetration Testing
Understanding penetration testing
()
Auditing security mechanisms
()
Managing risk
()
Locating security vulnerabilities
()
Identifying the attack vectors
()
Challenge: Compare pen tests from a vulnerability scan
()
Solution: Compare pen tests from a vulnerability scan
()
2. Types of Penetration Testing
Black, gray, and white-box testing
()
Checking from the outside in
()
Looking inside the organization
()
Testing using other methods
()
3. Pen Testing Techniques
Following a structured plan
()
Planning the pen test
()
Attacking the system
()
Delivering the results
()
Challenge: Explain the NIST Framework five core functions
()
Solution: Explain the NIST Framework five core functions
()
4. Pen Testing Blueprint
Checking physical security
()
Wireless penetration testing
()
Breach the website and the database
()
Leaking data via email or VoIP
()
Social engineering
()
5. Outsourcing Penetration Testing
Defining the project scope
()
Outsourcing penetration testing
()
Hiring consultants
()
Agreeing on terms
()
Conclusion
What's next
()