160
Introduction
How to Book One to One Trainer Online Meeting
CPT Lab
Kali Linux History
Kali Linux Installation
Kali Linux Configuration
Basic Search Utilities
Guided Exercise: Finding Files
Lab: Starting and Stopping Services
What is Penetration Testing
Benefits of Penetration Testing
Vulnerability Scans
Methodologies
Ethical Issues
Legal Issues
Quiz: Introduction to Penetration Testing
Penetration Testing Execution Standard
PCI DSS
NIST 800-115
CREST UK
OWASP Top 10
ISO 27002
Quiz: Standards
TCP/IP
IP Protocols
Network Architectures
Domain Name Server (DNS)
Management Protocols
Network Protocols
Using Netcat
Guided Exercise: Using Netcat
Basics of Cryptography
History of Encryption
Symmetric Encryption
Asymmetric (Public Key) Encryption
Digital Signatures
Hashing
MAC and HMAC
Encoding
Password Crackers
Steganography
Cryptanalysis
Quiz: Cryptography
Scripting
Windows PowerShell (Command Line Interface)
Linux Shell (Command Line Interface)
Guided Exercise: Writing a Simple Bash Script
Lab: Create a shell script to ping all hosts
Lab: Create a shell script to ping all hosts (Solution)
Passive Information Gathering
Guided Exercise: Using Shodan
Registration Records
Google Searching
Active Information Gathering
DNS Enumeration
Guided Exercise: DNS Enumeration
Host Discovery
Guided Exercise: Host Discovery
Port and Operating System Discovery
Guided Exercise: Port and Operating System Discovery
Fingerprinting and Enumeration
Guided Exercise: Fingerprinting and Enumeration
Lab: Information Gathering
Lab: Information Gathering (Solution)
Vulnerabilities
Packet Capture
Guided Exercise: Using Wireshark
Network Scanners
Guided Exercise: Using OpenVAS
Nmap NSE
Guided Exercise: Using Nmap Scripts
Metasploit Framework
Guided Exercise: Using Metasploit Framework
Web Application Scanners
Lab: Finding Vulnerabilities
Lab: Finding Vulnerabilities (Solution)
Important Windows Files
Windows Logs
The Registry
Active Directory Roles
Active Directory Database
Active Directory Reconnaissance
Guided Exercise: Active Directory Reconnaissance
User and System Enumeration
Guided Exercise: User and System Enumeration
Windows Vulnerabilities
Guided Exercise: Windows Vulnerabilities
Windows Privilege Escalation
Guided Exercise: Windows Privilege Escalation
Antivirus Evasion
Guided Exercise: Evading Windows Defender
Harvesting Credentials
Windows Password Cracking
Guided Exercise: Responder
Guided Exercise: Dumping Credentials from Memory
Guided Exercise: Extract SAM File from Windows Registry
Lab: Attacking SMB
Lab: Attacking SMB (Solution)
Linux Permissions Review
User Enumeration
Guided Exercise: User Enumeration
Linux/Unix Service Enumeration
Guided Exercise: Service Enumeration
Linux/Unix Vulnerabilities
Guided Exercise: Exploit ProFTPD
Linux Privilege Escalation
Guided Exercise: Linux Privilege Escalation
Linux / Unix Passwords
Lab: Linux/Unix Vulnerabilities
Lab: Linux/Unix Vulnerabilities (Solution)
Web Protocols
Web Servers
Guided Exercise: Web Servers
Web Application Structure Discovery
Cross-Site Scripting (XSS)
Guided Exercise: XSS
SQL Injection
Guided Exercise: SQL Injection
Directory Traversal
Guided Exercise: Directory Traversal
File Uploads
Guided Exercise: File Uploads
Command Execution
Guided Exercise: Command Execution
Databases
Microsoft SQL Server
Oracle RDBMS
MySQL
Lab: Assessing Databases
Lab: Assessing Databases (Solution)
Discovery
Windows Situational Awareness
Linux Situational Awareness
Lateral Movement
Guided Exercise: Pass the Hash
Guided Exercise: Port Forwarding
Data from Local System
Data Exfiltration with Frameworks
Guided Exercise: Data Exfiltration with Metasploit
Persistence
Windows Persistence
Windows Persistence with Scheduled Tasks
Guided Exercise: Scheduled Task
.bash Startup File Manipulation
Local Job Scheduling
Linux Persistence by Adding User Accounts
Windows Persistence by Adding User Accounts
Lab: Maintaining Access
Lab: Maintaining Access (Solution)
Introduction to Cloud Computing
Cloud Security
Threats and Attacks
Azure
Azure AD
Access Control
Attacking Azure with PowerZure
Writing Penetration Test Reports
Mock Exam
Exam Information
CPTv2 Course Evaluation