Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=3yoS2GMNpko



Duration: 0:25
5,209 views
9


As a cybersecurity professional, you have a unique responsibility to find and understand your organization's vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560, the flagship SANS course for penetration testing, fully arms you to address this duty head-on. SEC560 is the must-have course for every well-rounded security professional.

You'll learn how to perform detailed reconnaissance, studying a target's infrastructure by mining blogs, search engines, social networking sites, and other Internet and intranet infrastructures. Our hands-on labs will equip you to scan target networks using best-of-breed tools. We won't just cover run-of-the-mill options and configurations, we'll also go over the lesser-known but super-useful capabilities of the best pen test toolsets available today. After scanning, you'll learn dozens of methods for exploiting target systems to gain access and measure real business risk. You'll dive deep into post-exploitation, password attacks, and web apps, pivoting through the target environment to model the attacks of real-world bad guys to emphasize the importance of defense in depth.

Kevin Fiscus is the founder of and lead consultant for Cyber Defense Advisors where he performs security and risk assessments, vulnerability and penetration testing, security program design, policy development, and security awareness with a focus on serving the needs of small and mid-sized organizations. Kevin has over 20 years of IT experience and has focused exclusively on information security for the past 12.




Other Videos By SANS Institute


2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
2019-07-31Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
2019-05-28Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
2019-05-27Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
2019-05-24Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
2019-05-23Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes



Tags:
SANS SEC560
Kevin Fiscus
SANS Institute
Penetration Testing
PenTest
Ethical Hacking
Network Penetration Testing