This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Pentest+ Training (PT0-002) - Become a Professional Penetration Tester
INTRODUCTION
001 Welcome to the course (4:17)
002 Exam Foundations (4:44)
003 How to Schedule Your Exam (3:33)
CompTIA-Pentest-Study-Notes
DOMAIN 1 - PLANNING AND SCOPING
005 Planning and Scoping _Overview_ (1:27)
006 Penetration Testing Methodology (3:02)
007 Planning a Penetration Test (8:07)
008 Rules of Engagement (5:39)
009 Legal Concepts (11:00)
010 Testing Strategies (3:04)
011 White Box Support Resources (6:34)
012 Types of Assessments (5:47)
013 Threat Actors (7:41)
014 Target Selection (5:15)
015 Other Scoping Considerations (7:10)
DOMAIN 2 - INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
016 Information Gathering and Vulnerability Identification _Overview_ (2:40)
017 Information Gathering (10:11)
018 Reconnaissance with CentralOps _Demo_ (13:18)
019 Scanning and Enumeration (4:30)
020 Fingerprinting (4:19)
021 Scanning and Enumeration _Demo_ (15:59)
022 Cryptographic Inspection (1:32)
023 Eavesdropping (3:24)
024 Decompiling and Debugging (2:52)
025 Open Source Research (6:17)
026 Vulnerability Scanning (8:51)
027 Scanning Considerations (5:40)
028 Application and Container Scans (2:56)
029 Analyzing Vulnerability Scans (7:11)
030 Leverage Information for Exploit (3:23)
031 Common Attack Vectors (6:26)
032 Weaknesses in Specialized Systems (10:31)
DOMAIN 3 - ATTACKS AND EXPLOITS
033 Attacks and Exploits _Overview_ (2:00)
034 Social Engineering (12:18)
035 Motivation Factors (7:15)
036 Physical Security Attacks (5:30)
037 Lock Picking _Demo_ (1:28)
038 Network-based Vulnerabilities (13:47)
039 Wireless-based Vulnerabilities (8:48)
040 Wireless Network Attack _Demo_ (5:52)
041 Application-based Vulnerabilities (18:54)
042 Local Host Vulnerabilities (3:01)
043 Privilege Escalation _Linux_ (4:51)
044 Privilege Escalation _Windows_ (10:43)
045 Privilege Escalation (5:10)
046 Privilege Escalation _Demo_ (4:31)
047 Lateral Movement (9:11)
048 Persistence (6:50)
049 Covering Your Tracks (5:40)
050 Persistence and Covering Tracks _Demo_ (7:52)
DOMAIN 4 - PENETRATION TESTING TOOLS
051 Penetration Testing Tools _Overview_ (2:48)
052 Nmap Usage (10:15)
053 Nmap Usage _Demo_ (11:54)
054 Use Cases for Tools (7:28)
055 Scanners (2:07)
056 Credential Testing Tools (6:43)
057 Password Cracking _Demo_ (2:19)
058 Debuggers (2:41)
059 Software Assurance (2:13)
060 OSINT (4:49)
061 Wireless (1:48)
062 Web Proxies (8:58)
063 Social Engineering Tools (1:17)
064 Remote Access Tools (7:24)
065 Networking Tools (1:34)
066 Mobile Tools (2:05)
067 Miscellaneous Tools (4:28)
068 Intro to Programming (2:57)
069 Programming Concepts (21:51)
070 BASH Script Example (4:33)
071 Python Script Example (3:45)
072 PowerShell Script Example (3:27)
073 Ruby Script Example (4:28)
DOMAIN 5 - REPORTING AND COMMUNICATION
074 Reporting and Communication _Overview_ (1:54)
075 Pentest Communications
076 Report Writing
077 Mitigation Strategies
078 Post-Report Activities (4:20)
079 Pentest Report Example (0:46)
CONCLUSION
080 Conclusion (1:59)
081 Creating Your Pentest Lab (9:08)
082 BONUS Congratulations on Completing the Course (0:47)
005 Planning and Scoping _Overview_
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock