New Training: Penetration Testing Tools
In this 58-video, entry-level training, CBT Nuggets trainer Bob Salmans covers the knowledge security technicians need to recognize when to use different tools and software to round out your penetration testing repertoire and provide an understanding of a target’s vulnerabilities.
In the world of network and system security, few subjects carry quite as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they’re not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated. This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats.
The eight-part series covers topics such as identifying vulnerabilities and building a plan of attack, exploiting targets revealed in scans and attacking devices, and deploying industry pentest tools like Kali, network mappers, password crackers, and more as well as:
The eight skills that comprise this series are:
- Pentesting Reconnaissance
- Pentest Enumeration and NMAP
- Enumerating Services and Vulnerabilities
- Social Engineering Attacks and Tools
- Exploits and Payloads
- Metasploit Framework
- Network-Based Attacks and Tools
- Wireless and Mobile Device Attacks and Tools
While this training may not map to a certification, it’s still valuable skills training for security technicians looking to learn penetration testing tools.
Topics this training covers include:
- Social Engineering Tools
- Metasploit Modules
- Pentesting Reconnaissance Review
- VLAN Hopping Attacks
- Intro to Pentesting Enumeration
This training includes:
- 7 hour of training
- 58 videos
Watch a video from the series:
Here's some more penetration testing tools-related content from the CBT Nuggets blog:
- 10 Best Tools to Start Pen Testing
- Penetration Tests vs. Vulnerability Scans: The Difference
- How to Do Penetration Testing, Vulnerability Scanning
Start learning penetration testing tools today!