1 00:00:00,210 --> 00:00:05,160 ‫Welcome to the basic concepts of penetration testing and ethical hacking section. 2 00:00:06,280 --> 00:00:12,760 ‫Now, before learning how to perform penetration tests on live systems, let's first learn exactly what 3 00:00:12,760 --> 00:00:16,720 ‫the penetration test is and what the basic concepts are. 4 00:00:16,780 --> 00:00:23,830 ‫The way that I define them and the way that I'm going to use them throughout the course, please, I 5 00:00:23,830 --> 00:00:29,770 ‫want to warn you that this section is prepared to teach you the basic concept of penetration testing 6 00:00:29,770 --> 00:00:31,360 ‫and ethical hacking. 7 00:00:31,780 --> 00:00:35,380 ‫So I strongly recommend watching the lectures of this section. 8 00:00:36,460 --> 00:00:44,110 ‫However, if you already know the concept and terminologies of penetration testing, or if you're just 9 00:00:44,500 --> 00:00:50,650 ‫impatient and you really want to get right to the hands on practice, you can go ahead and skip this 10 00:00:50,650 --> 00:00:51,100 ‫section. 11 00:00:51,430 --> 00:00:52,360 ‫I give you permission. 12 00:00:52,690 --> 00:00:54,370 ‫Not that you needed it anyway. 13 00:00:55,550 --> 00:01:02,420 ‫In this section, we're going to learn what the penetration test is, and from now on, I'll just abbreviate 14 00:01:02,420 --> 00:01:10,130 ‫it to pen test the types of security tests and audits that we perform to understand the strength of 15 00:01:10,130 --> 00:01:15,490 ‫an IT network, security audits, eleanore ability assessments and pen tests. 16 00:01:16,370 --> 00:01:19,610 ‫The basic concept of offensive security. 17 00:01:20,780 --> 00:01:24,530 ‫Asset threat, vulnerability and risk. 18 00:01:25,750 --> 00:01:29,710 ‫The pen test approaches from black box to white box. 19 00:01:30,970 --> 00:01:34,630 ‫And what about the steps of planning a pen test? 20 00:01:35,730 --> 00:01:37,920 ‫What is the purpose of the test? 21 00:01:38,280 --> 00:01:40,920 ‫What is the scope of the test? 22 00:01:41,670 --> 00:01:48,210 ‫What are the requirements to test the scope and the restrictions of the test? 23 00:01:49,740 --> 00:01:56,580 ‫We're also going to learn the main phases of a pen test reconnaissance, a.k.a. information gathering, 24 00:01:57,480 --> 00:02:01,500 ‫scanning the network and scanning for the vulnerabilities. 25 00:02:02,720 --> 00:02:09,440 ‫Exploitation, a.k.a. gaining access and post exploitation. 26 00:02:11,620 --> 00:02:17,740 ‫Covering the tracks of the test and reporting the test results. 27 00:02:19,280 --> 00:02:28,730 ‫We're also going to learn the legal issues that you should know about and obey, and they'll worldwide 28 00:02:28,730 --> 00:02:33,380 ‫organizations that determine and publish pen test standard.