Practical Pentesting: featuring Brad Stine
Practical Pentesting7 H 19 M
Need to create a pen test final report? In this course, learn how to properly pre-plan and execute a successful pen test following the client's scope of work.
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Practical Pentesting: featuring Brad Stine
- Overview
- Pentesters - The Good, Bad and Ugly
- Pre-Engagement
- Pre-Engagement Part 2
- Data Security Agreements
- Statement of Work (SOW)
- Statement of Work (SOW) Part 2
- Statement of Work (SOW) Part 3
- Final Authorization
- Personal Engagement Toolkit
- Pentesting Platforms
- Stages of Assessment: Validate Scope
- Stages of Assessment: Recon
- Stages of Assessment: Vulnerability Scan
- Stages of Assessment: Vulnerability Scan Part 2
- Stages of Assessment: Documenting
- Stages of Assessment: Exploitation
- Stages of Assessment: Maintaining Access
- Stages of Assessment: Covering Tracks
- Stages of Assessment: Deliverables
- Blue Team Pentesting
Overview
2 M



- Episode Description
- Transcript
In this episode, Daniel and Brad quickly explore what will be covered by the Practical Pentesting series. This includes topics like Pre-engagement activities, statements of work, authorization, and the different stages of assessment.