<aside> 📌 Table of content

</aside>

2. Penetration Testing with Kali Linux: General Course Information

https://drive.google.com/file/d/1tE9-yyPzciy6dzSb0qwJbTzQmo1706zR/view?usp=share_link

1. Getting Started with PWK

2 - PWK Course Materials

ssh -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" [email protected]

4 - Connecting to the PWK Lab

To find a file

sudo updatedb
locate pen200.ovpn

2. How to Approach the Course

1 - A Model of Increasing Uncertainty

As a general rule, the only reason why hacking a machine takes any time at all is because there are things about it that we don't know. In a majority of cases, if we knew everything there was to know about a specific target ahead of time, then we would already know the precise few commands or lines of code necessary to compromise it.

3. Summary of PWK Learning Modules

Those are mainly definitions of each penetration test steps, look on the pdf if needed.

3. Introduction To Cybersecurity

This part is as the name says an introduction to cybersecurity. It gives nice bases of cybersecurity. I should make a summary of it after taking the actual exam.

2. Threats and Threat Actors

1 - The Evolution of Attack and Defense

We can take this analogy further to include compliance and risk management aspects of security. At some point, Bob accepts the risk that may steal bananas and decides to get insurance. But his banana insurance won't pay for stolen bananas unless he complies with their requirements for risk mitigation, which entail having a sturdy wall and guard dog.

⇒ Good example to explain GRC