We may earn an affiliate commission when you visit our partners.
Alexander Tushinsky

This course will teach you how to begin a penetration testing engagement.

Read more

This course will teach you how to begin a penetration testing engagement.

Penetration testing is an important aspect of most cybersecurity programs. Getting started with the right scope, plan, and timeline is an important aspect for a successful engagement. For an effective test, it is equally important to learn about and be familiar with your target so that you can apply this knowledge during the test itself. In this course, Pen Testing: Planning, Scoping, and Recon, you’ll be introduced to the initial phases of a penetration test. First, you’ll explore how we can establish scope and understand the customer's requirements. Next, you'll cover the documents needed for an engagement and why they are important. Finally, you’ll learn how to perform passive reconnaissance. When you’re finished with this course, you’ll have the skills and knowledge to engage and appropriately scope an engagement needed to perform a penetration test.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Pen Testing - Getting Started
Documentation & Legalities
Passive Reconnaissance
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Exploratory course that lends a solid grounding beginners in information security who are curious about a career in penetration testing
Taught by Alexander Tushinsky, an experienced professional in the field of information security, recognized for penetration testing expertise
Develops focused hands-on skills in a field that is in high demand in the industry and presents excellent job opportunities
Students are expected to come into the course with basic knowledge in information security
May be less relevant for individuals already working in information security, especially for penetration testing

Save this course

Save Pen Testing: Planning, Scoping, and Recon to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Pen Testing: Planning, Scoping, and Recon with these activities:
Review the basics of penetration testing
Reviewing the basics of penetration testing will help you understand the concepts and techniques that will be covered in this course.
Browse courses on Penetration Testing
Show steps
  • Read or watch introductory resources on penetration testing
  • Practice performing basic penetration testing techniques in a lab environment
Review Notes
Sharpen your understanding of the foundational principles of penetration testing, planning, scoping, and reconnaissance.
Browse courses on Penetration Testing
Show steps
  • Organize your notes from previous courses or workshops.
  • Identify key concepts and terms related to penetration testing.
  • Practice explaining these concepts to yourself or a study partner.
Follow a tutorial on how to use a penetration testing tool
Following a tutorial on how to use a penetration testing tool will help you become familiar with the features and capabilities of the tool, which will be useful in your penetration testing engagements.
Browse courses on Penetration Testing Tools
Show steps
  • Choose a penetration testing tool that you are interested in learning
  • Find a tutorial on how to use the tool
  • Follow the tutorial and complete the exercises
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Practice performing penetration testing techniques in a lab environment
Practice by performing penetration testing techniques in a lab environment will help you to develop your skills and build confidence in your abilities.
Show steps
  • Find a lab environment that you can use to practice penetration testing
  • Choose a penetration testing technique that you want to practice
  • Perform the penetration testing technique in the lab environment
Follow Online Tutorials
Supplement your course learning with comprehensive tutorials that delve deeper into specific aspects of penetration testing.
Browse courses on Penetration Testing
Show steps
  • Search for reputable online tutorials on penetration testing.
  • Choose tutorials that cover specific topics you want to strengthen.
  • Follow the tutorials thoroughly, taking notes and applying the techniques.
Practice Penetration Testing Techniques
Solidify your understanding of penetration testing techniques through hands-on exercises and simulations.
Browse courses on Penetration Testing
Show steps
  • Set up a virtual environment for penetration testing.
  • Practice using penetration testing tools such as Nmap, Burp Suite, and Metasploit.
  • Complete simulated penetration testing exercises.
Create a penetration testing plan
Creating a penetration testing plan will help you to define the scope of your engagement, identify the targets that you will be testing, and develop a methodology for your testing.
Browse courses on Cybersecurity Planning
Show steps
  • Define the scope of your engagement
  • Identify the targets that you will be testing
  • Develop a methodology for your testing
  • Write a penetration testing plan
Join a Study Group
Engage with fellow learners in a study group to discuss concepts, share insights, and gain diverse perspectives on penetration testing.
Browse courses on Penetration Testing
Show steps
  • Find or form a study group with other learners of this course.
  • Establish regular meeting times and agendas.
  • Lead discussions, present your understanding, and actively engage in peer feedback.
Plan and Scope a Penetration Test
Apply your knowledge by planning and scoping a real-world penetration test.
Browse courses on Penetration Testing
Show steps
  • Identify a target system or network for your penetration test.
  • Define the objectives and scope of your test.
  • Obtain necessary authorizations and approvals.
  • Develop a detailed test plan and methodology.
Write a Blog Post
Synthesize your knowledge by writing a blog post on a specific topic related to penetration testing.
Browse courses on Penetration Testing
Show steps
  • Choose a specific topic that interests you within the realm of penetration testing.
  • Research and gather credible information from reliable sources.
  • Structure your content in a logical and engaging way.
  • Write a well-written and informative blog post, ensuring clarity and accuracy.
Participate in a Capture the Flag (CTF) Event
Challenge yourself and test your skills in a simulated penetration testing environment.
Browse courses on Penetration Testing
Show steps
  • Find a reputable Capture the Flag (CTF) event or competition.
  • Form a team or participate individually.
  • Solve technical challenges and capture flags to earn points and progress through the event.

Career center

Learners who complete Pen Testing: Planning, Scoping, and Recon will develop knowledge and skills that may be useful to these careers:
Penetration Tester
Penetration testers are responsible for testing the security of an organization's computer systems and networks. They use a variety of techniques to identify vulnerabilities that could be exploited by attackers. This course provides a comprehensive overview of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Information Security Analyst
Information security analysts play a vital role in the protection of an organization's data and computer systems. They design and implement security measures, analyze security breaches, and provide security training to employees. This course provides a solid foundation in the principles and practices of penetration testing, which is a critical skill for information security analysts. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Information Security Manager
Information security managers are responsible for the overall security of an organization's information assets. They develop and implement security policies and procedures, manage security risks, and oversee security operations. This course provides a comprehensive overview of the principles and practices of penetration testing, which is a critical skill for information security managers. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Security Architect
Security architects design and implement security solutions for organizations. They assess an organization's security needs, identify vulnerabilities, and develop and implement security measures. This course provides a solid foundation in the principles and practices of penetration testing, which is a critical skill for security architects. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Cybersecurity Analyst
Cybersecurity analysts monitor and analyze an organization's computer systems and networks for security threats. They identify vulnerabilities, develop and implement security measures, and respond to security incidents. This course provides a solid foundation in the principles and practices of penetration testing, which is a critical skill for cybersecurity analysts. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Network Security Engineer
Network security engineers design, implement, and manage an organization's network security systems. They protect an organization's network from unauthorized access, attacks, and other threats. This course provides a strong foundation in the principles and practices of penetration testing, which is a critical skill for network security engineers. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Security Engineer
Security engineers design, implement, and manage an organization's security systems. They protect an organization's computer systems, networks, and data from unauthorized access, attacks, and other threats. This course provides a solid foundation in the principles and practices of penetration testing, which is a critical skill for security engineers. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Forensic Analyst
Forensic analysts investigate computer crimes and security incidents. They collect and analyze evidence, and provide expert testimony in court. This course provides a solid foundation in the principles and practices of penetration testing, which is a critical skill for forensic analysts. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Risk Analyst
Risk analysts identify, assess, and manage risks to an organization. They develop and implement risk management strategies, and advise senior management on risk-related decisions. This course provides a strong foundation in the principles and practices of penetration testing, which is a critical skill for risk analysts. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Cybersecurity Consultant
Cybersecurity consultants provide organizations with advice and guidance on how to protect their computer systems and data from cyber threats. They assess an organization's security posture, identify vulnerabilities, and develop and implement security solutions. This course will help you build a strong foundation in the principles and practices of penetration testing, which is a critical skill for cybersecurity consultants. By understanding how to plan, scope, and conduct a penetration test, you can help your clients identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Systems Engineer
Systems engineers design, implement, and manage an organization's computer systems and networks. They ensure that an organization's computer systems and networks are reliable, efficient, and secure. This course may be useful for systems engineers who want to develop a deeper understanding of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Security Consultant
Security consultants provide organizations with advice and guidance on how to protect their computer systems and data from cyber threats. They assess an organization's security posture, identify vulnerabilities, and develop and implement security solutions. This course may be useful for security consultants who want to develop a deeper understanding of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your clients identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Auditor
Auditors review and evaluate an organization's financial and operational activities. They ensure that an organization is compliant with laws and regulations, and that it is using its resources efficiently and effectively. This course may be useful for auditors who want to develop a deeper understanding of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Compliance Manager
Compliance managers oversee an organization's compliance with laws and regulations. They develop and implement compliance programs, and monitor and report on compliance activities. This course may be useful for compliance managers who want to develop a deeper understanding of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.
Software Developer
Software developers design, develop, and maintain computer software. They work with clients to understand their needs, and then design and develop software solutions that meet those needs. This course may be useful for software developers who want to develop a deeper understanding of the principles and practices of penetration testing. By understanding how to plan, scope, and conduct a penetration test, you can help your organization identify and mitigate security vulnerabilities, protect sensitive data, and ensure compliance with regulatory requirements.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Pen Testing: Planning, Scoping, and Recon.
Provides a comprehensive overview of the Metasploit framework, including how to use it for penetration testing. It valuable resource for anyone who wants to learn more about Metasploit or who wants to use it for penetration testing.
Provides a comprehensive overview of web application security, including the planning, scoping, and reconnaissance phases. It valuable resource for anyone who wants to learn more about web application security or who wants to use it for penetration testing.
Is about the Metasploit Framework, a widely used open-source tool for vulnerability assessment and exploitation.
Provides a step-by-step guide to building a penetration testing lab. It covers the necessary hardware and software, as well as how to configure and use the lab for penetration testing. It valuable resource for anyone who wants to set up their own penetration testing lab.
Provides a comprehensive overview of network security assessment, including the planning, scoping, and reconnaissance phases. It valuable resource for anyone who wants to learn more about network security assessment or who wants to improve their skills.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Pen Testing: Planning, Scoping, and Recon.
Planning and Scoping for CompTIA Pentest+
Most relevant
Information and Cyber Security GRC: Commission and Manage...
Most relevant
Web App Pen Testing: Reconnaissance
Most relevant
Information Gathering and Vulnerability Scanning for...
Most relevant
Pen Testing: Reporting
Most relevant
Post Exploitation with Meterpreter
Most relevant
Penetration Testing, Incident Response and Forensics
Most relevant
Metasploit: Getting Started
Most relevant
TOTAL: CompTIA PenTest+ (Ethical Hacking) PT0-002 + 2...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser