New Training: Penetration Testing Tools
In this 58-video, entry-level training, CBT Nuggets trainer Bob Salmans covers the knowledge security technicians need to recognize when to use different tools and software to round out your penetration testing repertoire and provide an understanding of a target's vulnerabilities.
Penetration Testing Tools Online Training
In the world of network and system security, few subjects carry quite as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they're not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated. This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.
The eight-part series covers topics such as identifying vulnerabilities and building a plan of attack, exploiting targets revealed in scans and attacking devices, and deploying industry pentest tools like Kali, network mappers, password crackers, and more as well as:
The eight skills that comprise this series are:
Pentesting Reconnaissance
Pentest Enumeration and NMAP
Enumerating Services and Vulnerabilities
Social Engineering Attacks and Tools
Exploits and Payloads
Metasploit Framework
Network-Based Attacks and Tools
Wireless and Mobile Device Attacks and Tools
While this training may not map to a certification, it's still valuable skills training for security technicians looking to learn penetration testing tools.
Topics this training covers include:
Social Engineering Tools
Metasploit Modules
Pentesting Reconnaissance Review
VLAN Hopping Attacks
Intro to Pentesting Enumeration
This training includes:
7 hour of training
58 videos
Watch a video from the series:
Here's some more penetration testing tools-related content from the CBT Nuggets blog:
10 Best Tools to Start Pen Testing
Penetration Tests vs. Vulnerability Scans: The Difference
How to Do Penetration Testing, Vulnerability Scanning
Start learning penetration testing tools today!
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.