Penetration Testing the Right Way


Dive into the field of Cyber Security with this Penetration Testing the Right Way training course. The course begins with a discussion on Software Vulnerability Assessments, and then moves on to topics such as vulnerability scanning with GFI LanGuard and Firebug. You will then learn about security testing tools and injection techniques. By the time you've completed this course, you will know all about Fragroute attacks, persistent XSS attacks, and so much more.

Length: 1.5 hrs

This title is available in the
Total Training All-Access library.

Subscribe Now


With this Penetration Testing the Right Way training course, you will learn ethical hacking methods for pen testing.

This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!

What is Penetration Testing?

Penetration testing (a.k.a. pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

The pen testing process usually involves gathering information about the target before the test. This is called reconnaissance. The next steps are to identify possible entry points, attempt to break in, and then report the findings. These tests are sometimes called “white hat attacks” because no harm is actually done.

Further uses for pen testing include: testing an organization’s security policy compliance, employees’ security awareness, and an organization’s ability to identify and respond to security incidents.


Sample clip


1. Penetration Testing the Right Way
 Software Vulnerability Assessment and Pen Testing (8:47)
 OpenVAS (1:30)
 Vulnerability Scanning with GFI LanGuard (1:51)
 Design Flaws and Bugs (3:53)
 Firebug (4:15)
 View Source Chart Hacks (3:40)
 Security Testing Tools (9:23)
 Fragroute Attacks (4:04)
 XSS and Injection Techniques (8:31)
 Persistent XSS Attack Example (1:53)
 Hacking with Perl (5:29)
 Hacking with C (9:50)


Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College.

You may also like…