Study any time, from any device.

Use Cases of Pentesting Tools

Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.

13 videos  //  41 minutes of training

Course description

It’s time to get to grips with pentesting tools. In this course, thirteen videos will take you through the broad variety of pentesting tools available, including (but not limited to) scanners, credential testing tools, debuggers, open-source intelligence (OSINT) tools, Web proxies, remote access tools and exploitation frameworks. Includes tool lists, definitions and comparisons.

Course syllabus

Use Cases for ToolsDuration: 7:26

ScannersDuration: 2:05

Credential Testing ToolsDuration: 6:42

DebuggersDuration: 2:39

Software Assurance ToolsDuration: 2:11

OSINT ToolsDuration: 4:47

Wireless Pentesting ToolsDuration: 1:46

Web ProxiesDuration: 1:38

Social Engineering ToolsDuration: 1:15

Remote Access ToolsDuration: 2:44

Networking ToolsDuration: 1:33

Mobile ToolsDuration: 2:03

Exploitation Frameworks and Other ToolsDuration: 4:26

Meet the author

Jason Dion

LinkedIn

Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.

Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer