Qualys demo - - vimore.org

Qualys demo

Qualys demo

YouTube

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Its very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve. With our proprietary penetration testing lab exercises, students will spend about 20 hours getting real-world penetration testing experience. They'll know what they are learning and they'll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. The C)PTE™ foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. Upon Completion Students will: Have knowledge to perform penetration test Have knowledge to accurately report on their findings from examinations Be ready to sit for the C)PTE Exam Course Content With 15 up-to-date Modules and 16 Labs, the C)PTE will not only teach you the know-how of penetration testing, but you'll have real-world experience to solidify what you have learned. Click on a module or lab to view its agenda. Module and appendix numbers correspond with their accompanying lab numbers. Class Format Options Mile2 offers courses around the year and around the globe. You can attend a course in 3 ways: Instructor-led Classroom: Attend in person. Live-virtual Training: Attend the Instructor-led class remotely. Computer-based Training: Access the course through pre-recorded videos 24/7 at your convenience. Who Should Attend The C)PTE is a course on penetration testing designed for those who already have a basic understanding of cyber security. We recommend an understanding of how computers are networked and how they interact with the internet (TCP/IP). Some of the tools we will use are only developed for Linux; therefor having experience with Linux is a plus. We recommend having the previously mentioned experience or you can prepare to take the course by completing the C)ISSO: Certified Information Systems Officer course as a prerequisite. People who are in or are going into the following professional roles will especially benefit from our course: Penetration Testing Consultant Security Analyst/Consultant Security Architect Chief Information Security Officer Security Auditor IT Management After you complete the C)PTE course and get certified, we recommend you to further develop your penetration testing skillset by being certified as a C)PTC: Certified Penetration Testing Consultant by taking the course and passing the 6 hour exam that will have you perform a penetration test that will really test what you know and can do! Exam Information The Certified Penetration Testing Engineer exam is taken online through Mile2™ Assessment and Certification System (MACS), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from the store on Mile2.com More Info: http://mile2.com/penetration-testing-ethical-hacking/cpte.html



Introduction To Using The Nessus Vulnerability Scanner

This video shows you how-to get started using the Nessus vulnerability scanner, including: Where to download Nessus Introduction to policies, scans, and rep

YouTube

REST API concepts and examples

This video introduces the viewer to some API concepts by making example calls to Facebook's Graph API, Google Maps' API, Instagram's Media Search API, and Twitt

YouTube

What is ArcSight?

This is the first in the new series of videos around what I am calling the 'What Is" series. In this first video for the series, I cover off the question of 'Wh

YouTube

Rapid7 - Nexpose Demo

Rapid7 Nexpose Demo

YouTube

Nikto Web Vulnerability Scanner - Web Penetration Testing - #1

Hey guys! HackerSploit here. In this video, we will be looking at Nikto, a web vulnerability scanner in Kali Linux. Nikto is an Open Source (GPL) web server sca

YouTube

ArcSight Console training - Part 1

Part 1 - Basic concepts and what is the console Introduction to the ArcSight Console, what it does, how it operates and what the basic aspects are of the syste

YouTube

Automated Web Testing with Burp Suite Pro

A quick guide for beginners on using Burp Suite Pro to do only automated testing of web apps. Burp can do a whole lot more, but the Scanner module is very capab

YouTube

Splunk Tutorial: "Creating Reports in Splunk Enterprise 6"

Splunk Tutorial: Creating Reports in Splunk Enterprise 6 Renee Asselin shows you how you can save searches as reports, add a time-range picker, and share your 

YouTube

Splunk Tutorial: "Creating Alerts in Splunk Enterprise 6"

Splunk Tutorial: Creating Alerts in Splunk Enterprise 6 Mark Houser demonstrates how to proactively monitor your events using Alerts. Download it for free & f

YouTube

Kubernetes Architecture | Understanding Kubernetes Components | Kubernetes Tutorial | Edureka

** Kubernetes Certification Training: https://www.edureka.co/kubernetes-certification ** This Edureka video on "Kubernetes Architecture" will give you an introd

YouTube

Splunk Tutorial: "Creating Dashboards in Splunk Enterprise 6"

Splunk Tutorial: Creating Dashboards in Splunk Enterprise 6 Renee Asselin shows you how to quickly create reports and dashboards in Splunk. Download it for fr

YouTube

Introduction to Vulnerability Assessment with Nessus

Author: Jeremy Druin Twitter: @webpwnized Thank you for watching. Please support this channel. Up vote, subscribe or even donate by clicking "Support" at https:

YouTube

Introduction to Nessus Version 6

This video provides an introduction to Nessus version 6, include new functionality for compliance and system hardening, automatic updates, a RESTful API, and mu

YouTube

Splunk Demo

YouTube

Coding With Python :: Learn API Basics to Grab Data with Python

Coding With Python :: Learn API Basics to Grab Data with Python This is a basic introduction to using APIs. APIs are the "glue" that keep a lot of web applicat

YouTube

CyberArk Brief: How to effectively manage local admin rights on endpoints.

Learn how to effectively remove local admin rights from standard business users to reduce the attack surface without bring productivity to a halt. Managing loc

YouTube

Jenkins Beginner Tutorial 1 - Introduction and Getting Started

Jenkins Beginner Tutorial 1 - Introduction and Getting Started ================================================== Jenkins - java application - used for co

YouTube

Retina Enterprise Network Security Scanner Training - BeyondTrust

Check out our entire Enterprise Vulnerability Management suite here: https://www.beyondtrust.com/products/retina/ Retina Enterprise Network Security Scanner:

YouTube

What is a SIEM

What is a security information and event management (SIEM) system?

YouTube