Penetrating Networks for CompTIA PenTest+
Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization.
What you'll learn
Connecting computing devices together to share files and other resources is certainly an essential part of today's computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it's basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement. .
Table of contents
- Course Introduction 2m
- Sniffing 5m
- Eavesdropping 3m
- ARP Poisoning 5m
- Demo: Some Housekeeping 5m
- Demo: ARP Poisoning 5m
- Demo: Sniffing with Wireshark 2m
- TCP Session Hijacking 3m
- Browser Hijacking 6m
- Man-in-the-Middle (MiTM) Attack 3m
- Bruteforce Attacks 6m
- DoS and Stress Testing 2m
- Pass-the-hash 2m
- VLAN Hopping 2m
- Specialized Systems: Mobile 2m
- Specialized Systems: ICS and SCADA 2m
- Specialized Systems: Embedded Systems 1m
- Specialized Systems: Real-Time Operating Systems (RTOS) 1m
- Specialized Systems: Internet of Threats...Things (IoT) 1m
- Specialized Systems: Point of Sale Systems (PoS) 2m
- The Things You Don't Want to Miss 1m