Do you learn best by video trainings? If YES, You have come to the right place.
Learn the important and practical topics such as pentest pre-planning methods, legal concepts, and proper scoping tactics. Get to look at a wide variety of pentesting tools like, Metasploit, Burp Suite, the Social Engineering Toolkit, Mimikatz, and Nmap.
Learn how pentesters discover sensitive data and gain access to remote systems using methods like SQL Injection, Cross-Site Scripting(XSS), Social Engineering, Man-in-the-Middle(MITM), Wireless attacks, Privilege Escalation, Post-exploitation, and others.Finally,explore creating reports that will be presented to clients that reveal the findings of an engagement.
Discuss mitigation and other post-report activities like cleanup of files/tools/shells, follow-ups, retests, and lessons learned.