Please enable JavaScript.
Coggle requires JavaScript to display documents.
Penetration Testing with Kali Linux : General Course Introduction - Coggle…
Penetration Testing with Kali Linux : General Course Introduction
Welcome to PWK
Take inventory over what’s included in the
course
Set up an Attacking Kali VM
Connect to and interact over the PWK VPN
Understand how to complete Module
Exercises
How to Approach the
Course
Conceptualize a learning model based on
increasing uncertainty
Understand the different learning
components included in PEN-200
Introduction to
Cybersecurity
The Practice of
Cybersecurity
Recognize the challenges unique to
information security
Understand how "offensive" and
"defensive" security reflect each other
Begin to build a mental model of useful mindsets applicable to information security
Threats and Threat Actors
Understand how attackers and defenders
learn from each other
Understand the differences between risks,
threats, vulnerabilities, and exploits
List and describe different classes of
threat actor
Recognize some recent cybersecurity
attacks
The CIA Triad
Learn why it's important to protect the
integrity of information
Explore why it's important to protect the
availability of information
Understand why it's important to protect
the confidentiality of information
Security Principles, Controls,
and Strategies
Describe threat intelligence and its
applications in an organization
Learn why access and user privileges
should be restricted as much as possible
Understand the importance of multiple
layers of defense in a security strategy
Understand why security should not
depend on secrecy
Identify policies that can mitigate threats
to an organization
Determine which controls an organization
can use to mitigate cybersecurity threats
Cybersecurity Laws,Regulations, Standards, and Frameworks
Understand different frameworks and standards that help organizations orient their cybersecurity activities
Gain a broad understanding of various legal and regulatory issues surrounding cybersecurity
Summary of PWK Learning
Modules
Obtain a high level overview of what’s
covered in each PEN-200 Learning Module
Career Opportunities in
Cybersecurity
Identify career opportunities in
cybersecurity
Effective Learning
Strategies
Learning Theory
Understand the general state of our understanding about education and education theory
Understand the basics of memory mechanisms and dual encoding
Recognize some of the problems faced by learners, including "The Curve of Forgetting" and cognitive load
Unique Challenges to
Learning Technical Skills
Recognize the differences and advantages
of digital learning materials
Understand the challenge of preparing for
unknown scenarios
Understand the potential challenges of
remote or asynchronous learning
OffSec Methodology
Understand what is meant by a
Demonstrative Methodology
Understand the challenge of preparing for
unknown scenarios
Understand the potential challenges of
remote or asynchronous learning
Case Study:
chmod -x chmod
Review a sample of learning material about the executable permission, expand beyond the initial information set, and work through a problem
Understand how OffSec's approach to teaching is reflected in the sample material
Tactics and Common
Methods
Learn about Retrieval Practice
Understand Spaced Practice
Explore the SQ3R and PQ4R Method
Examine the Feynman Technique
Understand the Leitner System
Advice and Suggestions on
Exams
Develop strategies for dealing with
exam-related stress
Recognize when you might be ready to
take the exam
Understand a practical approach to exams
Practical Steps
Create a long term strategy
Understand how to use a time allotment
strategy
Learn how and when to narrow your focus
Understand the importance of a group of
co-learners and finding a community
Explore how best to pay attention and capitalize on our own successful learning strategies
Report Writing for
Penetration Testers
Understanding Note-Taking
Identify the general structure of pentesting
documentation
Choose the right note-taking tool
Understand the importance of taking
screenshots
Use tools to take screenshots
Writing Effective Technical Penetration Testing Reports
Identify the purpose of a technical report
Understand how to specifically tailor
content
Construct an Executive Summary
Account for specific test environment
considerations
Create a technical summary
Describe technical findings and
recommendations
Recognize when to use appendices,
resources, and references