Network Penetration Testing Essentials (PEN-100)

Network Penetration Testing Essentials (PEN-100)

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 157 Lessons (12h 51m) | 18.96 GB

PEN-100: Network Penetration Testing Essentials is foundational OffSec training for aspiring ethical hackers. Learn Linux and Windows command line, network protocols, scripting with Bash and Python, and explore essential security tools like Nmap, Kali Linux, and Metasploit. Build a strong ethical hacking mindset with hands-on practice in reconnaissance, exploitation, and post-exploitation techniques. Perfect for beginners looking to start a cybersecurity career.

What you’ll learn

  • PowerShell, Netstat, WMIC
  • Network protocols such as TCP/IP, DNS, HTTP, SMB
  • Scripting with Bash and Python for automation
  • Security tools like Nmap, Wireshark, Metasploit
  • Linux command line file management, processes, permissions
  • Recon, exploitation, post-exploitation within an ethical hacking framework

Is it worth it to take a PEN-100 course?
Yes, it’s worth taking this PEN-100 course if you’re new to cybersecurity or you need a refresher on foundational skills. This course will give you hands-on experience with system administration, networking, scripting, troubleshooting, and cryptography – which are all essential for penetration testing. This course provides a foundation of skills and knowledge that can lead to advanced or specialty certifications like the PEN-200, or get you started in a career in penetration testing.

How difficult will this PEN-100 (Penetration Testing Essentials) course be?
This PEN-100 course was designed for beginners – it’s approachable if you’re new to cybersecurity or if you need a refresher. Diving into topics like Linux, Windows, networking, and scripting can be challenging, but the course assumes very little prior experience and includes clear explanations, hands-on activities, and assessments to reinforce learning. This is meant as a foundational course, so you won’t be forced into advanced pentesting before you’re ready.

How can learning penetration testing essentials impact your career?
Learning the basics behind penetration testing opens up career pathways into almost all aspects of cybersecurity. The foundational skills in systems administration, networking, scripting and troubleshooting that this course covers are highly valued by employers. And once you’re finished with this course, you’ll be prepared to take more specialized and advanced penetration testing courses, which opens up roles like pentester, security analyst, or ethical hacker.

What are penetration testing skills useful for?
Penetration testing skills are essential for identifying and mitigating vulnerabilities in networks, systems and applications. Those kinds of skills help you secure sensitive data, ensure compliance with regulations, and maintain trust in your digital systems. Whether you stop after taking this course, or use it to move on to more advanced penetration testing skills, you’ll learn skills that are valuable in IT security, systems administration, and even network design.

Who should take this PEN-100 course?
The best candidate for this course is a newcomer to cybersecurity or an IT professional who wants to transition into security roles. This PEN-100 course is good for anyone who wants to build foundational skills in systems administration, networking, and scripting. This course lays a very wide foundation, so it’s equally useful for people pursuing a penetration testing career as well as those looking to get into other IT jobs.

Who is this for?
This PEN-100 training is considered foundational OffSec training, designed for aspiring penetration testers and cybersecurity beginners. This Network Penetration Testing Essentials course is valuable for IT professionals with basic networking and Linux knowledge, as well as security enthusiasts looking to build a strong ethical hacking foundation.

Table of Contents

Introduction to PEN-100
1 Adding more to our security toolkit
2 What will Pen-100 cover
3 Building Blocks
4 Understanding Virtualization
5 Type 1 and Type 2
6 Type 2
7 We need permission!
8 We need permission! Part 2
9 We need permission! Part 3
10 Challenge

Installing and Configuring Kali
11 What is Kali
12 What is Kali Part 2
13 Picking our Kali
14 Picking our Kali Part 2
15 Downloading and installing Kali
16 Downloading and installing Kali Part 2
17 Live Kali
18 Challenge
19 Solution

Linux Basics
20 POSIX-Based Systems
21 Formatting
22 Formatting Part 2
23 Directory Structure
24 Missing File Types
25 File Permissions
26 Usernames and Passwords
27 Services and Logs
28 Services
29 Challenge
30 Solution

Installing and Configuring Windows
31 Getting to know Windows
32 Formatting
33 Formatting Part 2
34 Directory Structuring
35 Directory Structuring Part 2
36 File Types
37 Username and Passwords
38 Challenge
39 Solution

Windows Basics
40 Getting into the Windows Operating System
41 Local Security Policy
42 Local Security Policy Part 2
43 Registry
44 Registry Part 2
45 Temporary and Hidden Folders
46 Disk Management
47 Services and Logs
48 Logging
49 Challenge
50 Solution

Linux Networking
51 Linux Networking
52 ifconfig
53 Where did those interfaces come from
54 DNS Configuration
55 Routing Configuration
56 iptables
57 GUI help
58 Challenge
59 Solution

Windows Networking
60 Windows Networking
61 Looping back…
62 Hardware in VMWare
63 Windows PowerShell
64 Wireshark
65 promisc
66 Windows Firewall
67 Wireshark
68 Challenge
69 Solution

Networking Basics
70 Understanding how the network talks
71 Scoping things out
72 Scoping things out part 2
73 Capturing some traffic
74 Wireshark
75 tcpdump
76 Active and passive listening
77 Challenge
78 Solution
79 Bonus video

Wireless Networking Basics
80 Wireless Networks
81 Heat mapping
82 Addendum
83 Wireless Channels and Rogue Access Points
84 Going Rogue
85 Wireless Promiscuous
86 Kismet
87 Kismet Part 2
88 Challenge
89 Solution

PowerShell Scripting
90 Baby steps before running
91 pseudocode
92 Where do we script at
93 Where do we script at Part 2
94 For Loop
95 Using our loop knowledge to check the network
96 Saving our work
97 Scripting for more details
98 Challenge
99 Solution

Python Scripting
100 Let’s learn another loop
101 Python requirements
102 Why Python
103 Why Python Part 2
104 Remember Environment Variables
105 Scanning with Python
106 What’s Scapy
107 What’s the difference between the two
108 Challenge
109 Solution

Bash Scripting
110 Introduction
111 Bash
112 Scripting in Bash
113 Scripting in Bash Part 2
114 Making sure we stay in Bash
115 Creating a program to run in Bash
116 Creating a program to run in Bash Part 2
117 Challenge
118 Solution

Monitoring with Kali
119 Kali being used for good
120 Kali being used for good Part 2
121 Kali being used for good
122 Monitoring and discovering networks Part 1
123 Monitoring and discovering networks Part 2
124 Monitoring and discovering networks Part 3
125 Monitoring and discovering networks Part 4
126 Monitoring for hidden networks
127 Monitoring for hidden networks Part 2
128 Challenge
129 Solution

Metasploit Framework
130 Metasploit Framework
131 Metasploit on Kali
132 Systems Without Metasploit
133 How to Prep the Target
134 Other Metasploit Add-Ins
135 Options Outside of Metasploit

Cryptography
136 Cryptography Overview
137 Synchronous Crypto
138 Synchronous Crypto Examples
139 Asynchronous Crypto
140 Asynchronous Crypto Example
141 Cryptography Review

Web Application Understanding
142 Knowing our targets
143 Web Application Backbone
144 Web Application Backbone Part 2
145 POSIX-Based – Apache
146 POSIX-Based – Apache Part 2
147 Discovering Web Application use on a target
148 Challenge
149 Solution

Introduction to Active Directory
150 What is Active Directory
151 Installing Active Directory
152 Post Install
153 Post Install Part 2
154 User and Group information
155 Policy Enforcement
156 Challenge
157 Solution

Homepage