Introduction
The importance of security testing
()
What you should know
()
1. Understanding Security Assessments
Language is important
()
Risk assessments
()
Calculating risk score
()
Security controls assessments
()
NIST and ISO
()
Compliance assessments
()
Vulnerability assessments
()
Penetration tests
()
Goals of penetration tests
()
The security assessment lifecycle
()
2. Your Testing Environment
The security tester's toolkit
()
Kali Linux
()
Nmap
()
Nessus
()
Wireshark
()
Lynis
()
CIS-CAT Lite
()
Aircrack-ng
()
Hashcat
()
OWASP ZAP
()
OWASP ZAP demo
()
3. Planning Your Assessment
Understanding your scope
()
Improving over time
()
Selecting your methodology
()
Vulnerability testing
()
Basic assessment tools
()
Advanced assessment tools
()
4. Review Techniques
Documentation review
()
Logging and monitoring
()
Log management tools
()
Ruleset review
()
System configuration review
()
CIS-CAT demo
()
Network sniffing
()
Wireshark demo
()
File integrity checking
()
5. Identifying Your Targets
Network discovery
()
Open-source intelligence
()
Network port and service identification
()
Nmap demo
()
Vulnerability scanning
()
Determining severity
()
Nessus demo
()
Wireless scanning
()
Wireless testing process
()
Aircrack demo
()
6. Vulnerability Validation
Password cracking
()
Hashcat demo
()
Penetration test planning
()
Penetration test tools
()
Penetration test techniques
()
Social engineering
()
SET demo
()
7. Additional Considerations
Coordinating your assessments
()
Data analysis
()
Providing context
()
Data handling
()
Drafting your report
()
Delivering your report
()
Ex_Files_Security_Testing_EssT.zip
(1.0 MB)