Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

7 hours 6 minutes
Video Transcription
Hey, everyone, welcome back to the course in this video. What is going to wrap up the course so we'll talk about what we covered. We'll also talk about some next step courses that you can take.
So what do we talk about in this course? What? We covered a lot of pen testing related topics, so we talked about things like reconnaissance or gathering that information about our target. We talked about scanning and enumeration as well to identify potential vulnerabilities on the target. We talked about system hacking in there. We also talked about things like malware, etcetera.
We talked about I, O T and O. T. And if you recall the OT penetration testing, we wanna be mindful that we should not be, in most cases, pen testing the actual live production OT network. Right? It's okay for us to test the external, the I T network, and try to gain access to the OT devices, but
we wanna be mindful that we shouldn't be just start
running and map scans on a no TV production network. We also talked about Web attacks of both Web server and Web application attacks went over a brief overview of cryptography had a very, very high level. We also talked about the clouds. We talked about the different types of services available. We also talked about mobile. So mobile hacking.
So what can you do after this? What kinds of courses can you take on Sai Buri after this particular course? Well,
we've got a course called I O T products Security. That kind of dives a little deeper into how to secure the devices at a manufacturing type of level. So understanding the firm war and hardware of the device
we've got a course on P test, which is a penetration testing execution standard. This is a good one for you to understand, sort of a framework to perform a penetration test. This is especially useful for brand new, uh, pen testers or people interested in penetration testing,
of course, on end maps. So we kind of covered in map at a very, very high level when we talked about scanning. But you could really deep dive in and map course and understand it both from an attacker perspective and how it could be used, as well as how you can leverage it on the defensive side
and offensive penetration testing. So that one is a good hands on course, sort of the next level after this course. And it will help you prepare for Certs like the SCP examination. So that's a good course to take for that and also physical penetration testing. So if you're interested in things like lock picking or just breaking into buildings
and figuring that stuff out,
that's the physical plantation course. It's a really great course by a Dustin Perry and Sean.
So in this video, we just talked about what we've actually learned throughout this course again, a lot of high level topics around penetration, testing as well as the next step courses you can take.
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By