CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
Video description
Your perfect companion to prepare and ace the CompTIA Pentest+ (PT0-001) exam
About This Video
Learn ethical hacking from an examination point of view
Understand the penetration testing methodology
Plan and scope a penetration test
In Detail
The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment and analyze/report on …
CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
Video description
Your perfect companion to prepare and ace the CompTIA Pentest+ (PT0-001) exam
About This Video
Learn ethical hacking from an examination point of view
Understand the penetration testing methodology
Plan and scope a penetration test
In Detail
The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment and analyze/report on your findings. This certification was released by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field).
This course is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course). This course provides everything you need in order to study for the CompTIA Pentest+ exam. Each section is dedicated to each of the 5 domains, and each domain contains brief videos on topics that will further your understanding of ethical hacking and get you one step closer to ace the exam.
By the end of the course, you will have the confidence to tackle the CompTIA Pentest+ exam and become a certified ethical hacker. You will also create your own pentest lab.
Chapter 3 : Domain 2: Information Gathering and Vulnerability Identification
Information Gathering and Vulnerability Identification (Overview)
Information Gathering
Reconnaissance with CentralOps (Demo)
Scanning and Enumeration
Fingerprinting
Scanning and Enumeration (Demo)
Cryptographic Inspection
Eavesdropping
Decompiling and Debugging
Open Source Research
Vulnerability Scanning
Scanning Considerations
Application and Container Scans
Analyzing Vulnerability Scans
Leverage Information for Exploit
Common Attack Vectors
Weaknesses in Specialized Systems
Chapter 4 : Domain 3: Attacks and Exploits
Attacks and Exploits (Overview)
Social Engineering
Motivation Factors
Physical Security Attacks
Lock Picking (Demo)
Network-Based Vulnerabilities
Wireless-Based Vulnerabilities
Wireless Network Attack (Demo)
Application-Based Vulnerabilities
Local Host Vulnerabilities
Privilege Escalation (Linux)
Privilege Escalation (Windows)
Privilege Escalation
Privilege Escalation (Demo)
Lateral Movement
Persistence
Covering Your Tracks
Persistence and Covering Tracks (Demo)
Chapter 5 : Domain 4: Penetration Testing Tools
Penetration Testing Tools (Overview)
Nmap Usage
Nmap Usage (Demo)
Use Cases for Tools
Scanners
Credential Testing Tools
Password Cracking (Demo)
Debuggers
Software Assurance
OSINT
Wireless
Web Proxies
Social Engineering Tools
Remote Access Tools
Networking Tools
Mobile Tools
Miscellaneous Tools
Introduction to Programming
Programming Concepts
BASH Script Example
Python Script Example
PowerShell Script Example
Ruby Script Example
Chapter 6 : Domain 5: Reporting and Communication
Reporting and Communication (Overview)
Pentest Communications
Report Writing
Mitigation Strategies
Post-Report Activities
Pentest Report Example
Chapter 7 : Conclusion
Conclusion
Creating Your Pentest Lab
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept