Video description
- Exploit your network and perform penetration tests
- Footprint and scan networks and websites for vulnerabilities
- Be aware of key vulnerabilities to watch out for within your network and website
Table of contents
- Introduction 00:01:24
- Network Pentesting Lab Setup 00:03:37
- Installing Virtual Machines 00:03:37
- Operating Systems 00:05:01
- Network Footprinting and Scanning 00:01:15
- What is Network Footprinting? 00:01:15
- IP Scanner 00:05:23
- Port Scanning 00:04:49
- Installing Network Vulnerability Scanner 00:04:43
- Using the Network Vulnerability Scanner 00:06:41
- Network Exploitation Techniques 00:01:07
- About Network Exploitation 00:01:07
- Penetration Testing 00:10:05
- Website Footprinting and Scanning 00:02:50
- Website Footprinting Techniques 00:02:50
- Web Vulnerability Scanner 00:09:31
- Website Exploitation Techniques 00:02:27
- Website Vulnerabilities 00:02:27
- Injection Attacks on Websites 00:10:03
Product information
- Title: Ethical Hacking - Networks and Websites
- Author(s):
- Release date: November 2018
- Publisher(s): Apress
- ISBN: 9781484243411
You might also like
video
Certified Ethical Hacker (CEH), 2nd Edition
An updated edition of this video title is available. Please go to Certified Ethical Hacker, Version …
video
Ethical Hacking - Learning the Basics
Go through the basics of network security and penetration testing to begin your journey to becoming …
video
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …
book
Introduction to Computer Networks and Cybersecurity
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity …