- Learn about the role and how to become a penetration tester.
- Learn fundamentals and frequently used tools of pen testing.
- Explore intermediate and advanced pen testing concepts.
Become a Penetration Tester
via LinkedIn Learning Path
Overview
This path provides an overview of the concepts, tools, and techniques used in penetration testing, one of the most in-demand skills in cybersecurity. Learn about the role and fundamentals of pen testing, and explore tools and techniques used to identify vulnerabilities in systems and networks.
Syllabus
Courses under this program:
Course 1: Cybersecurity Careers: Become a Penetration Tester
-Explore the skills and knowledge that you need in order to become a penetration tester (pen tester).
Course 2: Introduction to Pen Testing for Cybersecurity Professionals
-Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
Course 3: Penetration Testing Essential Training (2021)
-Penetration testing is one of the best ways to find out if your security will hold. Learn how to identify vulnerabilities in your network, computers, and applications.
Course 4: Kali Linux for Advanced Pen Testing and Ethical Hacking
-Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Course 5: Penetration Testing Web Apps with Kali and Burp Suite
-Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
Course 6: Advanced Pen Testing Techniques for Active Directory
-Explore concrete, practical strategies for penetration testing Active Directory to prevent enterprise cybersecurity threats.
Course 7: Burp Suite Essential Training
-Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
Course 8: Stealth Penetration Testing with Advanced Enumeration
-Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Course 1: Cybersecurity Careers: Become a Penetration Tester
-Explore the skills and knowledge that you need in order to become a penetration tester (pen tester).
Course 2: Introduction to Pen Testing for Cybersecurity Professionals
-Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
Course 3: Penetration Testing Essential Training (2021)
-Penetration testing is one of the best ways to find out if your security will hold. Learn how to identify vulnerabilities in your network, computers, and applications.
Course 4: Kali Linux for Advanced Pen Testing and Ethical Hacking
-Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Course 5: Penetration Testing Web Apps with Kali and Burp Suite
-Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
Course 6: Advanced Pen Testing Techniques for Active Directory
-Explore concrete, practical strategies for penetration testing Active Directory to prevent enterprise cybersecurity threats.
Course 7: Burp Suite Essential Training
-Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
Course 8: Stealth Penetration Testing with Advanced Enumeration
-Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Courses
-
Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
-
Penetration testing is one of the best ways to find out if your security will hold. Learn how to identify vulnerabilities in your network, computers, and applications.
-
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
-
Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
-
Explore the skills and knowledge that you need in order to become a penetration tester (pen tester).
-
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
-
Explore concrete, practical strategies for penetration testing Active Directory to prevent enterprise cybersecurity threats.
-
Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
Taught by
Tennisha Virginia M., Lisa Bock and Malcolm Shore