Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
0:00 Introduction
0:24 Vulnerability management
58:06 Introduction to Pentesting
1:19:38 Cyber Kill Chain
1:42:47 Mitre Attack Framework
2:32:08 Pentesting Windows and Linux
Day 1: SIEM Methods – https://www.youtube.com/watch?v2ojAj7VCn24
Day 2: Testing Web Applications – https://www.youtube.com/watch?vZstyFyfS3g4
Day 3: Network Assessment and Pen Testing – https://www.youtube.com/watch?vlP0KyEh1jZ0
#vapt #PenTesting #CyberSecurity
Agenda of the meeting
Vulnerability analysis
• Introduction to vulnerability analysis
• Vulnerability classifications
• Vulnerability assessment management lifecycle
• Vulnerability assessment system
• Vulnerability assessment tools
introduction
• Different phases of the pentest
• Types of penetration tests
• Teamwork
• Introduction to pen testing distributions
• Cyber Kill Chain Methodology
• MITRE ATT&CK Framework
• Commercial and open source tools
• Packet analysis with Wireshark
• Pentesting Windows and Linux environments using manual and automated exploitation techniques.
Subscribe to our channel to get video updates. Click the subscribe button.
Facebook: https://www.facebook.com/Infosectrain/
Twitter: https://twitter.com/Infosec_Train
LinkedIn: https://www.linkedin.com/company/infosec-train/
Instagram: https://www.instagram.com/infosectrain/
Telegram: https://t.me/infosectrains
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.