Online Courses Professional Development Business Skills Practical Pentesting: featuring Brad Stine

Practical Pentesting: featuring Brad Stine

Created by: Stone River Elearning
5.0 541 views Prime
Last Updated 10/2023
English
Export to your LMS
Full Lifetime Access
Self-Paced
Finish in
450 mins!
Made for for
Employees
only
Certificate
of Completion
Mobile -
Friendly
Access

Description

In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through the lens of Brad's experience as a Pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.

There are several pentesting platforms available in the market that can assist in conducting penetration testing and vulnerability assessments. These platforms provide a range of tools and functionalities to identify and exploit vulnerabilities in computer systems, networks, and applications

A typical penetration testing engagement consists of several stages or phases that help guide the assessment process. These stages ensure a systematic and comprehensive approach to identifying vulnerabilities and assessing the security posture of the target system. The specific names and order of the stages may vary depending on the methodology followed by the pentester or the organization conducting the assessment.

The course includes Blue Team pentesting, also known as defensive security testing or purple teaming, is a practice where a team of security professionals simulates real-world attacks on a company's systems and infrastructure to evaluate and improve the organization's defensive capabilities. Unlike traditional penetration testing (red teaming), which focuses on identifying vulnerabilities and exploiting them, blue team pentesting is centered around assessing and enhancing the effectiveness of an organization's security controls and incident response processes.

Author

Stone River Elearning

667 Courses

Stone River Elearning specializes in Professional Development and Business Skills training, with a strong emphasis on IT & Software Development. Their catalog spans programming, data science, IT certifications, and design, while also covering leadership and communication. Courses are structured for learners at all levels, from beginner to advanced professionals. The training helps individuals gain high-demand skills to advance careers and supports corporate learning initiatives. Stone River is trusted worldwide for its practical and accessible digital learning solutions.

Practical Pentesting: featuring Brad Stine

Practical Pentesting: featuring Brad Stine
Practical Pentesting: featuring Brad Stine

In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through the lens of Brad's experience as a Pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.

There are several pentesting platforms available in the market that can assist in conducting penetration testing and vulnerability assessments. These platforms provide a range of tools and functionalities to identify and exploit vulnerabilities in computer systems, networks, and applications

A typical penetration testing engagement consists of several stages or phases that help guide the assessment process. These stages ensure a systematic and comprehensive approach to identifying vulnerabilities and assessing the security posture of the target system. The specific names and order of the stages may vary depending on the methodology followed by the pentester or the organization conducting the assessment.

The course includes Blue Team pentesting, also known as defensive security testing or purple teaming, is a practice where a team of security professionals simulates real-world attacks on a company's systems and infrastructure to evaluate and improve the organization's defensive capabilities. Unlike traditional penetration testing (red teaming), which focuses on identifying vulnerabilities and exploiting them, blue team pentesting is centered around assessing and enhancing the effectiveness of an organization's security controls and incident response processes.

Frequently Asked Questions

This course is designed for employees who need to complete Practical Pentesting: featuring Brad Stine training

Yes. This course is designed to meet applicable federal requirements and commonly mandated state standards. Always confirm specific state or industry requirements with your local regulations.

The course takes approximately 450 minutes to complete and can be paused and resumed at any time.

Yes. Learners receive a downloadable certificate upon successful completion, which can be used for compliance records and audits.

Yes. You can assign this course to individuals or groups using Coggno’s LMS, or purchase multiple seats for your team.

Yes. This course can be exported for delivery in most learning management systems (SCORM compatible).

Yes. The course is fully self-paced and available 24/7.

Yes. This course includes a knowledge check to reinforce learning and verify completion.

Learners have lifetime access from the date of purchase.

Yes. A preview is available so you can review the course format and content before purchasing.

Yes. Content is reviewed and updated as regulations and best practices change.

Yes. This course is available for free with an active Prime Subscription.

Yes. Refund requests can be submitted within 30 days of purchase.