What are the tools of a penetration test? This course will answer that as well as cover vulnerability assessment, password cracking, how to disable auditing, rootkits and alternate data streams. Then it progress to 3 configurations of DMZs, hardening and isolating, layer 2 security options and separation of duties. Finally threats like SSL renegotiation and web access vulnerabilities will round out the course. This course contains the following lessons:
Lesson 1:
Lesson 2:
Lesson 3:
Lesson 4:
Lesson 5: