Penetration testing tools and techniquesUploader: Elliot 3 days ago Subscribe 4158
This module covers the analysis of the results gained from each of the vulnerability and network scans and how to quantify and triage that information based on the severity, risk and ease of exploitation. Learn more about QA careers. The types of information useful to a penetration test How to enumerate and fingerprint hosts and devices on the network How to use NMAP to map networks and services How to use online resources to disclose useful information How to analyse and use information during a penetration test Module 2 - Vulnerability scanning This module covers the tools and techniques used to find vulnerabilities on both system and web applications and services on the network using tools like Nessus and Zed Attack Proxy to highlight potential vulnerabilities and interesting areas for testing. This module covers the various tools and methods used to exploit both system and web application vulnerabilities using tools like Metasploit in order to verify vulnerabilities and eliminate false positives. Attacking a network via human error or compromised credentials is nothing new. Hand picked by our experts, these interlocking skills enable the Complete Cyber Analyst. To find out more about any of our services please contact us.