The Cybersecurity Nexus (CSX) Penetration Testing Overview (CPTO) course provides students an introductory
understanding of penetration testing and ethical hacking. Students will work with real systems in real environments and
will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will
understand the overall concepts guiding penetration testing from a practical, hands-on vantage point.
Continuing Professional Education (CPE) Credit Count: 20
The Unix bourne-again shell, also known as Bash, is a command processor that runs in the Kali Linux terminal. Bash scripting and command execution is the foundation of penetration testing.
In Linux, viewing and configuring network connections is not only a fundamental aspect of computer and network security, but it is also an essential piece of the penetration testing infrastructure.
Wireshark is a free and open source network protocol analyzer that is both efficient and effective. In Kali Linux, packets are captured in Wireshark by penetration testers and cybersecurity professionals on a daily basis.
Again, Wireshark is a free and open source network protocol analyzer that is both efficient and effective. It is necessary for penetration testers to understand the packets that are traversing through a network segment while discovering network hosts and navigating to websites.
The CLI tool, nmap, and its GUI counterpart, Zenmap, are both extremely important when it comes to identifying and enumerating network hosts, ports and services, and more.
Metasploit is a software project that is arranged for penetration testing. Metasploit provides essential information about computer and network security vulnerabilities and helps users exploit machines.
Using the results of an exploit to enable another exploit is something penetration testers do on a daily basis. Once their exploits take them deep enough into a remote system, using MySQL syntax to navigate a MySQL database can be a crucial skill when they're in search of information.
Removing evidence, also known as covering your tracks, is the last step in penetration testing. Although it is the last step, it is by far not the least important.
This challenge is based on the first four labs of this series. This lab reflects the Identify domain of penetration testing.
This challenge is based on the last four labs of this series. This lab reflects the Identify, Detect, and Recover domains of penetration testing.