Done for You: Comprehensive Collection of Pentesting Content

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Done for You: Comprehensive Collection of Pentesting Content

Author: ginasilvertree | Published on August 17, 2018 | Views: 4688

Pentesting students on Cybrary are busy (as are all Cybrarians). Every day, there’s so much to do and learn! So, I took a little time (okay, a lot of time) to search the mysterious corners of the Cybrary site to put together this collection of pentesting content just for you.

Keep in mind that some of the content kicks it old school; but, as a pentester, you should know old school tools and a bit of history. These, along with many others, are important elements in successful pentesting. For example, penetration testers sometimes need to ethically hack into older systems, which are often full of holes as they were built with little to no security. And, it’s helpful for pentesters to know the history of older hacking tools and why they can or can’t be used today.

If you’re looking for intermediate or advanced Pentesting coursework, consider joining the 1000K+ members who are already part of the Cybrary Insider Pro Program to be “confidently guided down the path towards your next job and a new career.”

And, now, back to the content: this list of Pentesting content is not for the faint of heart, so take your time. However, it’s been grouped in a moderately organized albeit charmingly random fashion.

Plus, don’t forget to share this post with a friend who’s been itching to learn more about intermediate or advanced pentesting.

Pentesting Career Picture:

The Career Path of the Penetration Tester

How to be an Ethical Hacker in the U.K.

Make a Pentester’s Salary – Here’s Where to Start

The Average Salary of a Certified Ethical Hacker (CEH)

Hacker vs. Cracker – Do You Know The Difference?

Hack Your Way to a Rewarding and Challenging Pentesting Career

Pocket-Guide for the Penetration Tester Career Path

Interview Prep: Penetration Tester

Overview and the Journey:

The Comprehensive Guide to Ethical Hacking

Ethical Hacking Overview

Red Team Vs Blue Team Review

The Journey of Penetration Testing

What is Penetration Testing to You?

Are You Properly Using Your Hoodie as a Penetration Tester?

Phases and Tools:

Summarizing The Five Phases of Penetration Testing

How to Hack: The Full Penetration Testing Process

7 Best Cyber Security Penetration Testing Tools

Pentesting Methodology from an Attacker’s POV

PenBox: An Automated Pentesting Framework

Tutorials and Toolkits:

Tutorial: Setting up a Virtual Pentesting Lab at Home

Set up Your Penetration Testing Lab for Web Application Security Testing

How to Build a USB Drive Pentesting Toolkit

A Short Practice Guide for PenTests

Steps Before Your Physical Social Engineering PenTest

A Few Tricks to Manually Pentest a Website (Without Any Tools)

Start Learning Mobile Penetration Testing and the Smartphone Pentest Framework

Industrial Protocols For Pentesters

Assessments and Reporting:

Vulnerability Assessment & Penetration Testing, An Analysis

Pentesting vs. Vulnerability Assessment in Typical Application Scenarios

What to Include in a Penetration Testing Report

Checklists and Cheat Sheets:

Penetration Testing Checklist

A Penetration Testing Checklist For Linux Machine – Intrusion Discovery

A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Server Penetration Testing Checklist

Labs and Test Prep:

Crack the CEH Exam

Certified Ethical Hacker (CEH) Virtual Lab

Ethical Hacking (CEH Preparation)

Core Impact Web Application Penetration Testing

Computer Forensics and Investigations Virtual Lab

Ultimately, as a penetration tester, you’ll use your powers for good to find vulnerabilities in networks, internal systems, and applications. This might include automated testing but may also require manually attempting to breach security. Some days, you’ll be creating new tests to identify system weaknesses and pinpointing entry points for hackers. When vulnerabilities are identified, you’ll advise the powers that be (managers or executives) on how to make networks and systems more secure.

It’s a crazy world out there and I want you to be ready for many of the scenarios you’ll encounter as a pentester; I hope the information provided in this post was helpful.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel