Penetration Testing SharePoint

There's a lot more to securing the SharePoint environment than you realize--you need to correctly configure and test it. This course will take you through the steps, the tools, and the process of penetration testing your SharePoint environment.
Course info
Level
Intermediate
Updated
May 2, 2016
Duration
3h 32m
Table of contents
Description
Course info
Level
Intermediate
Updated
May 2, 2016
Duration
3h 32m
Description

Creating a SharePoint environment is now almost a common occurrence in most organizations. Setting it up correctly, using least privilege, securing the perimeter and the front end are often overlooked. Too often people simply just expect SharePoint to take care of all the security, when in reality they need to correctly configure and test it. In this course, Penetration Testing SharePoint, you'll learn how to perform a penetration test that specifically identifies security holes and related issues. First, you'll learn how to map the SharePoint environment. Next, you'll learn how to scan the SharePoint network and widen the attack vector. Finally, you'll attack SharePoint yourself, testing how well you've managed to secure it. By the end of this course, you'll know how to perform a penetration test in SharePoint, and more importantly, you'll be able to ensure that your content and site are safe from potential security or data breaches.

About the author
About the author

Liam began his career as a Trainer of all things computer-related. He quickly realized that programming, breaking, and hacking was a lot more fun.

More from the author
Configuring SharePoint 2016 Workloads
Intermediate
3h 22m
May 15, 2019
More courses by Liam Cleary
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Liam Cleary, and welcome to my course, Penetration Testing SharePoint. I am an associate director and architect at Protiviti in Winchester, Virgina in the USA, as well as a 10-year Microsoft MVP for SharePoint. SharePoint is now one of the most used collaboration and sharing platforms in the world. However, many implementations do not cater for security controls and/or protection as many of the other applications that are running within an organization. In this course, we're going to walk through the steps that make up a penetration test and then look at the tools needed to perform this test. We will also look at the core SharePoint design and structure and see how it can be protected not only from a penetration test but security in general. Some of the major topics that we will cover include: Why perform a penetration test? Some of the tools needed to perform these tests. How SharePoint can be specifically targeted. And how to protect from these types of attacks and tests. By the end of the course, you'll know the basics of performing a penetration test, specifically for SharePoint, along with the tools needed for protecting the infrastructure. I hope you'll join me on this journey to learn securing SharePoint with the Penetration Testing SharePoint course here at Pluralsight.