Pentest+

Or log in to access your purchased courses

This course is for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities.

Avatar
Course By

Joseph McCray

Lessons

C1L1: Introduction

Author: Joseph McCray

Introduction This lesson was made to demonstrate various characteristics related to the pentest+ course and explain the various factors which create the whole structure of the Ethical Hacking environment (legal agreements, different methodologies, types of attacks, standardization organisms and reliable source of information). Everything that is described in this lesson is for you to prepare [...]

C1L2: Footprinting

Author: Joseph McCray

Introduction Just imagine, you as a hunter or a fisherman, I mean a professional. And you are preparing your excursion to find your prey. What do you require? You are…

C1L3: Scanning

Author: Joseph McCray

Introduction Once we have collected enough information (location, Network infrastructure, IP addresses, Protocols,  Infrastructure brand, Internal/external hosting, Cloud usage) from our target we can start the scanning phase, which is…

C1L4: Enumeration

Author: Joseph McCray

Introduction: Enumeration is the method of identifying each domain that is present within the LAN. These domains are discovered using built-in Windows commands. Enumeration is also described as the process of…

C1L5: System Hacking

Author: Joseph McCray

Introduction: Once we have captured the most substantial amount of information from our target: 1. we have obtained information from the network. 2. we have identified IP addresses, services, open…

C1L6: Malware Threats

Author: Joseph McCray

Introduction: Who enjoys a disease? Except we use it as a reason to skip an unpleasant event, right?. A virus comes without warning and resides and thrives in the host.…

C1L7: Sniffing

Author: Joseph McCray

Introduction: After compromising a system or the machine of a user, there is no doubt that we can acquire much more information, such as passwords of some systems, sensitive or…

C1L8: Social Engineering

Author: Joseph McCray

Introduction: Social Engineering is the art of manipulation and the skill of exploiting human weakness. A social engineering attack can occur over the phone, by e-mail, by a personal visit,…

C1L9: Denial of Service

Author: Joseph McCray

Introduction: The availability of the applications, systems or other platform are also victims for an attack. In this lesson, we will talk about the various methods of denial of service…

C1L10: Session Hijacking

Author: Joseph McCray

Introduction: Another way to access any system, the name says it all. How a hacker can portray you to obtain a corporation and take anything he gets his “hands” on,…

C1L11: Hacking WebServers

Author: Joseph McCray

Introduction Web systems are an important element in the analysis of hacking. They are commonly used to publish systems, Web services,, and others. When a web server is compromised, it…

C1L12: Hacking Web Applications

Author: Joseph McCray

Introduction: Web servers utilize Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) to permit web-based clients to connect to them and view and download files. HTTP is an…

C1L13: SQL Injection

Author: Joseph McCray

Introduction: Have you seen in the news lately, news like Credit Card information of clients have been stolen from “X” corporation?, or, Social Security Numbers were stolen from “X” government…

C1L14: Hacking Wireless Networks

Author: Joseph McCray

Introduction: Nowadays the vast majority of connections, are considered wireless, and hackers know everything about it, and so should you. Join this module and learn multiple ways, and tools used…

C1L15: Hacking Mobile Platforms

Author: Joseph McCray

Introduction: Currently, mobile platforms are highly used to manage our confidential information, such as banking transactions, credentials, mail and other, turning this type of platform into a potential target for…

C1L17: Cloud Computing

Author: Joseph McCray

Introduction: Cloud Computing is an on-demand offering of IT capabilities where IT infrastructure and applications are provided to subscribers as metered services over a network. Learning Objectives: By the completion…

C1L18: Cryptography

Author: Joseph McCray

Introduction: Confidentiality, integrity, authentication (CIA). Hash, security certificates, how the data is safeguarded. Basic concepts and its importance. Learning Objectives: By the end of this lesson you should be able…

C1L19: Ethics, Process, General Knowledge

Author: Joseph McCray

Introduction: Ethical hackers are security professionals or network penetration testers who practice their hacking skills and toolsets for shielding and protective purposes. Ethical hackers who are security professionals examine their…

C1L21: IoT Security

Author: Joseph McCray

Introduction: The implementation of IoT devices does not prevent the probability of being compromised, on the contrary, its widespread use has turned it into a potential target of attack by …

C2-L3 Performing Non- Technical Tests

Author: Joseph McCray

Introduction If social engineering and physical security testing are within the scope of your pen test engagement, you might want to consider not jumping into active reconnaissance right away. Your…

C2-L5 Analyzing Vulnerabilities

Author: Joseph McCray

Introduction You have finished uncovering vulnerabilities through your active reconnaissance efforts. Now you need to decide how to turn those results into the best exploits with which to test the…

C2-L6 Penetrating Networks

Author: Joseph McCray

Introduction The first category of an asset that you will target is the organization’s network. Weaknesses in networking infrastructure will enable you to gain entry to hosts in the network,…

C2-L8 Testing Applications

Author: Joseph McCray

Introduction Now that you have tested the target organization’s network and its various hosts, you can turn your attention to its applications. There are many different ways software can be…

C2-L9 Completing Post-Exploit Tasks

Author: Joseph McCray

Introduction You have targeted the significant computing assets an organization must keep protected—networks, hosts, and applications—and have done what you can to exploit their weaknesses. This was the core phase…