Penetration Testing Execution Standard (PTES) | Cybrary


Penetration Testing Execution Standard (PTES) | Cybrary
English | Size: 2.67 GB
Genre: eLearning

Course Description
There are a lot of tools and training videos out there, some providing great value to your education and betterment as a Security Professional.

If I were to ask you today, what steps does your team take to perform a penetration test or what standard do you follow, what is your response? Would you work to understand the client business, would discussions of a contract happen, what is and is not within scope, would you establish emergency contact information and rules of engagement? After doing all that, what process is you team following to conduct the test? Do you dive right in and start running scans or do you have a methodology you prefer to follow? If you have little experience in conducting penetration tests or have been doing so for years, this course will help you to feel confident in addressing clients or your business leaders with a sound standard in hand.

Course Goals
By the end of the course, students should be able to:

Understand and apply pre-engagement activities such as:
Client engagement and scoping questions
Understanding scope creep and how to avoid it
Specifying targets within the scope
Discussion on DoS testing
Dealing with Third Parties
Understand and apply Intelligence Gathering activities such as:
Level 1, 2, and 3 Information gathering
Target selection and limitations
Time considerations and end goals
Open Source Intelligence and its forms
External foot-printing concepts and tools
Internal foot-printing concepts and tools
Understand and apply Threat Modeling activities such as:
High level modeling processes
Business Asset Analysis
Business Processes Analysis
Reviewing threat agents
Threat capabilities
Motivation Modeling
Finding Relevance
Understand and apply Vulnerability Analysis activities such as:
Testing Systems
Active versus Passive testing
Validation
Research Principles
Understand and apply Exploitation activities such as:
The purpose and reason for exploitation
Application of countermeasures against appropriate technologies
Evasion techniques against IPS and IDS
Example of Network Service Exploitation
Understand and apply Post Exploitation activities such as:
Rules of Engagement
Legal Protections
Infrastructure Analysis
Data and Systems Review
High Value System Targeting
Data Exfiltration Testing
Establishing persistence
Lateral Movement
Cleanup
Understand and apply Reporting concepts such as:
Executive summary development
Terminology and layout
Addressing the audience
Protection of Sensitive data

nitroflare.com/view/A8C78A520FF1A4E/CBR41907.20.7.part1.rar
nitroflare.com/view/FBD4C9E733426FA/CBR41907.20.7.part2.rar
nitroflare.com/view/6CCF4D1C9834B4D/CBR41907.20.7.part3.rar
nitroflare.com/view/994BAF5A0757BD9/CBR41907.20.7.part4.rar
nitroflare.com/view/291E333D6BECB3A/CBR41907.20.7.part5.rar
nitroflare.com/view/9385EA7C6B78678/CBR41907.20.7.part6.rar

rapidgator.net/file/311c94df862ed97c6e1dbfb94cb7ebcd/CBR41907.20.7.part1.rar.html
rapidgator.net/file/b111279fd55a4887d02193b3d2b44456/CBR41907.20.7.part2.rar.html
rapidgator.net/file/d69673f85ed13a0c61ed82dbcab73274/CBR41907.20.7.part3.rar.html
rapidgator.net/file/b1a34e2e79d8d274b5029c4c05f2b004/CBR41907.20.7.part4.rar.html
rapidgator.net/file/bab903722ec17faeebdb1af758093af0/CBR41907.20.7.part5.rar.html
rapidgator.net/file/ca0494e1a4ffcd2700f2c164411b03e7/CBR41907.20.7.part6.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.