There's a lot more to securing the SharePoint environment than you realize--you need to correctly configure and test it. This course will take you through the steps, the tools, and the process of penetration testing your SharePoint environment.
Creating a SharePoint environment is now almost a common occurrence in most organizations. Setting it up correctly, using least privilege, securing the perimeter and the front end are often overlooked. Too often people simply just expect SharePoint to take care of all the security, when in reality they need to correctly configure and test it. In this course, Penetration Testing SharePoint, you'll learn how to perform a penetration test that specifically identifies security holes and related issues. First, you'll learn how to map the SharePoint environment. Next, you'll learn how to scan the SharePoint network and widen the attack vector. Finally, you'll attack SharePoint yourself, testing how well you've managed to secure it. By the end of this course, you'll know how to perform a penetration test in SharePoint, and more importantly, you'll be able to ensure that your content and site are safe from potential security or data breaches.
Course Overview Hi everyone. My name is Liam Cleary, and welcome to my course, Penetration Testing SharePoint. I am an associate director and architect at Protiviti in Winchester, Virgina in the USA, as well as a 10-year Microsoft MVP for SharePoint. SharePoint is now one of the most used collaboration and sharing platforms in the world. However, many implementations do not cater for security controls and/or protection as many of the other applications that are running within an organization. In this course, we're going to walk through the steps that make up a penetration test and then look at the tools needed to perform this test. We will also look at the core SharePoint design and structure and see how it can be protected not only from a penetration test but security in general. Some of the major topics that we will cover include: Why perform a penetration test? Some of the tools needed to perform these tests. How SharePoint can be specifically targeted. And how to protect from these types of attacks and tests. By the end of the course, you'll know the basics of performing a penetration test, specifically for SharePoint, along with the tools needed for protecting the infrastructure. I hope you'll join me on this journey to learn securing SharePoint with the Penetration Testing SharePoint course here at Pluralsight.