CompTIA PenTest+ (PT0-001) – Penetration Testing

Closed Caption

Certificate

Dedicated Tutors

217 Videos
26 Hours
249 Test Questions

Course Description

CompTIA PenTest+ (PT0-001) – Penetration Testing

The CompTIA PenTest+ (PT0-001) certification program is a comprehensive training designed for cybersecurity professionals who seek to specialize in penetration testing and vulnerability assessment. This certification validates the knowledge and skills required to conduct thorough penetration tests to identify, exploit, report, and manage vulnerabilities in an organization’s network and applications. Covering a broad range of topics such as information gathering, attacks and exploits, post-exploitation techniques, and reporting, the PenTest+ certification equips participants with the expertise to protect and secure IT environments. It is ideal for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to enhance their offensive security capabilities.

Key Features:

  • Planning and Scoping: Learn the initial stages of penetration testing, including defining the scope, understanding legal and compliance considerations, and developing a detailed test plan to ensure a structured and compliant approach.
  • Information Gathering and Vulnerability Identification: Gain proficiency in reconnaissance techniques, using tools and methods for information gathering, network scanning, and vulnerability identification to uncover potential security weaknesses.
  • Attacks and Exploits: Explore various attack techniques and exploitation methods, understanding how to leverage discovered vulnerabilities to gain unauthorized access and achieve specific testing objectives.
  • Post-Exploitation Techniques: Learn the techniques used after exploiting a system, such as maintaining access, pivoting through networks, and collecting data, to further assess the depth of a security breach.
  • Reporting and Communication: Develop skills in documenting findings and creating detailed penetration test reports. Learn to effectively communicate results, risks, and recommendations to stakeholders and technical teams.
  • Tools and Technologies: Hands-on training with popular penetration testing tools such as Metasploit, Nmap, Burp Suite, and Wireshark. Understand tool functionalities, configurations, and best practices for effective testing.
  • Penetration Testing Methodologies: Study industry-standard methodologies and frameworks, including the Penetration Testing Execution Standard (PTES) and the Open Web Application Security Project (OWASP), ensuring a systematic and professional approach.
  • Ethical Hacking Principles: Emphasize the importance of ethical hacking practices, ensuring penetration tests are conducted responsibly, legally, and ethically, in accordance with industry standards.
  • Network and Application Security: Assess the security of network infrastructures and applications, testing for common vulnerabilities such as SQL injection, cross-site scripting (XSS), buffer overflows, and more.
  • Risk Analysis and Mitigation: Learn to analyze and prioritize risks associated with discovered vulnerabilities. Develop strategies for mitigating these risks and recommending appropriate remediation actions.

This CompTIA PenTest+ (PT0-001) certification program is perfect for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to develop their skills in offensive security. Completing this certification equips participants with the capabilities to identify, exploit, and mitigate security vulnerabilities, ensuring their organizations can maintain a strong security posture.


Talk to a Career Coach!


Train & Earn with Guaranteed Career Coaching Success!

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

Step-by-Step Courses List

Chapter One:

PenTest : 1 – The PenTest Engagement

  1. 1.0 PenTest Plus Introduction
  2. 1.1 PenTest Plus Topics
  3. 1.2 PenTest Engagement
  4. 1.3 Threat Modeling
  5. 1.4 Technical Constraints
  6. 1.5 PenTest Engagement Review
  7. 1.6 Examining PenTest Engagement Documents Act
Chapter Two:

PenTest : 2 – Passive Reconnaissance

  1. 2.1 Passive Reconnaissance part1
  2. 2.2 WHOIS Act
  3. 2.3 Passive Reconnaissance part2
  4. 2.4 Google Hacking Act
  5. 2.5 Passive Reconnaissance part3
  6. 2.6 DNS Querying Act
  7. 2.7 Passive Reconnaissance part4
  8. 2.8 Email Server Querying Act
  9. 2.9 SSL-TLS Cerfificates
  10. 2.10 Shodan Act
  11. 2.11 The Havester
  12. 2.12 TheHarvester Act
  13. 2.13 Recon-ng
  14. 2.14 Recon-g Act
  15. 2.14 Recon-ng-Part-2-API-key Act
  16. 2.15 Maltego
  17. 2.16 Have I been Pwned
  18. 2.17 Punked and Owned Pwned Act
  19. 2.18 Fingerprinting Organization with Collected Archives
  20. 2.19 FOCA Act
  21. 2.20 Findings Analysis Weaponization
  22. 2.21 Chp 2 Review
Chapter Three:

PenTest : 3 – Active Reconnaissance

  1. 3.1 Active Reconnaissannce
  2. 3.2 Discovery Scans Act
  3. 3.3 Nmap
  4. 3.4 Nmap Scans Types Act
  5. 3.5 Nmap Options
  6. 3.6 Nmap Options Act
  7. 3.7 Stealth Scans
  8. 3.8 Nmap Stealth Scans Act
  9. 3.9 Full Scans
  10. 3.10 Full Scans Act
  11. 3.11 Packet Crafting
  12. 3.12 Packet Crafting Act
  13. 3.13 Network Mapping
  14. 3.14 Metasploit
  15. 3.15 Scanning with Metasploit Act
  16. 3.16 Enumeration
  17. 3.17 Banner Grabbing Act
  18. 3.18 Windows Host Enumeration
  19. 3.19 Winddows Host Enumeration Act
  20. 3.20 Linux Host Enumeration
  21. 3.21 Linux Host Enumeration Act
  22. 3.22 Service Enumeration
  23. 3.23 Service Enumeration Act
  24. 3.24 Network Shares
  25. 3.25 SMB Share Enumeration Act
  26. 3.26 NFS Network Share Enumeration
  27. 3.27 NFS Share Enumeration Act
  28. 3.28 Null Sessions
  29. 3.29 Null Sessions Act
  30. 3.30 Website Enumeration
  31. 3.31 Website Enumeration Act
  32. 3.32 Vulnerability Scans
  33. 3.33 Compliance Scans Act
  34. 3.34 Credentialed Non-credentialed Scans
  35. 3.35 Using Credentials in Scans Act
  36. 3.36 Server Service Vulnerability Scan
  37. 3.37 Vulnerability Scanning Act
  38. 3.38 Web Server Database Vulnerability Scan
  39. 3.39 SQL Vulnerability Scanning Act
  40. 3.40 Vulnerability Scan Part 2 OpenVAS Act
  41. 3.41 Web App Vulnerability Scan
  42. 3.42 Web App Vulnerability Scanning Act
  43. 3.43 Network Device Vulnerability Scan
  44. 3.44 Network Device Vuln Scanning Act
  45. 3.45 Nmap Scripts
  46. 3.46 Using Nmap Scripts for Vuln Scanning Act
  47. 3.47 Packet Crafting for Vulnerbility Scans
  48. 3.48 Firewall Vulnerability Scans
  49. 3.49 Wireless Access Point Vunerability
  50. 3.50 Wireless AP Scans Act
  51. 3.51 WAP Vulnerability Scans
  52. 3.52 Container Security issues
  53. 3.53 How to Update Metasploit Pro Expired Trial License
Chapter Four:

PenTest : 4 – Physical Security

  1. 4.1 Physical Security
  2. 4.2 Badge Cloning Act
  3. 4.3 Physical Security Review
Chapter Five:

PenTest : 5 – Social Engineering

  1. 5.1 Social Engineering
  2. 5.2 Using Baited USB Stick Act
  3. 5.3 Using Social Enginnering to Assist Attacks
  4. 5.4 Phishing Act
  5. 5.5 Social Engineering Review
Chapter Six:

PenTest : 6 – Vulnerability Scan Analysis

  1. 6.1 Vulnerbility Scan Analysis
  2. 6.2 Validating Vulnerability Scan Results Act
  3. 6.3 Vulnerbility Scan Analysis Review
Chapter Seven:

PenTest : 7 – Password Cracking

  1. 7.1 Password Cracking
  2. 7.2 Brute Force Attack Against Network Service Act
  3. 7.3 Network Authentication Interception Attack
  4. 7.4 Intercepting Network Authentication Act
  5. 7.5 Pass the Hash Attacks
  6. 7.6 Pass the Hash Act
  7. 7.7 Password Cracking Review
Chapter Eight:

PenTest : 8 – Penetrating Wired Networks

  1. 8.1 Penetrating Wired Network
  2. 8.2 Sniffing Act
  3. 8.3 Eavesdropping
  4. 8.4 Eavesdropping Act
  5. 8.5 ARP Poisoning
  6. 8.6 ARP Poisoning Act
  7. 8.7 Man In The Middle
  8. 8.8 MITM Act
  9. 8.9 TCP Session HiJacking
  10. 8.10 Server Message Blocks SMB Exploits
  11. 8.11 SMB Attack Act
  12. 8.12 Web Server Attacks
  13. 8.13 FTP Attacks
  14. 8.14 Telnet Server Attacks
  15. 8.15 SSH Server Attacks
  16. 8.16 Simple Network Mgmt Protocol SNMP
  17. 8.17 Simple Mail Transfer Protocol SMTP
  18. 8.18 Domain Name System DNS Cache Poisoning
  19. 8.19 Denail of Service Attack DoS-DDoS
  20. 8.20 DoS Attack Act
  21. 8.21 VLAN Hopping Review
Chapter Nine:

PenTest : 9 – Penetrating Wireless Networks

  1. 9.1 Penetrating Wireless Networks
  2. 9.2 Jamming Act
  3. 9.3 Wireless Sniffing
  4. 9.4 Replay Attacks
  5. 9.5 WEP Cracking Act
  6. 9.6 WPA-WPA2 Cracking
  7. 9.7 WAP Cracking Act
  8. 9.8 Evil Twin Attacks
  9. 9.9 Evil Twin Attack Act
  10. 9.10 WiFi Protected Setup
  11. 9.11 Bluetooth Attacks
  12. 9.12 Penetrating Wireless Networks
Chapter Ten:

PenTest : 10 – Windows Exploits

  1. 10.1 Windows Exploits
  2. 10.2 Dumping Stored Passwords Act
  3. 10.3 Dictionary Attacks
  4. 10.4 Dictionary Attack Against Windows Act
  5. 10.5 Rainbow Table Attacks
  6. 10.6 Credential Brute Force Attacks
  7. 10.7 Keylogging Attack Act
  8. 10.8 Windows Kernel
  9. 10.9 Kernel Attack Act
  10. 10.10 Windows Components
  11. 10.11 Memory Vulnerabilities
  12. 10.12 Buffer Overflow Attack Act
  13. 10.13 Privilegde Escalation in Windows
  14. 10.14 Windows Accounts
  15. 10.15 Net and WMIC Commands
  16. 10.16 Sandboxes
Chapter Eleven:

PenTest : 11 – Linux Exploits

  1. 11.1 Linux Exploits
  2. 11.2 Exploiting Common Linux Features Act
  3. 11.3 Password Cracking in Linux
  4. 11.4 Cracking Linux Passwords Act
  5. 11.5 Vulnerability Linux
  6. 11.6 Priviledge Escalation Linux
  7. 11.7 Linux Accounts
  8. 11.8 Linux Exploits Review
Chapter Twelve:

PenTest : 12 – Mobile Devices

  1. 12.1 Mobile Devices
  2. 12.2 Hacking Android Act
  3. 12.3 Apple Exploits
  4. 12.4 Moblie Devices Review
Chapter Thirteen:

PenTest : 13 – Specialized Systems

  1. 13.1 Specialized Systems
  2. 13.2 Specialized Systems Review
Chapter Fourteen:

PenTest : 14 – Scripts

  1. 14.1 Scripts
  2. 14.2 Powershell
  3. 14.3 Python
  4. 14.4 Ruby
  5. 14.5 Common Scripting Elements
  6. 14.6 Scripts Review
  7. 14.7 Better Ping Sweep
  8. 14.8 Simple Port Scanner2
  9. 14.9 Multitarget Port Scanner
  10. 14.10 Port Scanner with Nmap
  11. 14.11 Scripts Review
Chapter Fifteen:

PenTest : 15 – Application Testing

  1. 15.1 Application Testing
  2. 15.2 Reverse Engineering
Chapter Sixteen:

PenTest : 16 – Web App Exploits

  1. 16.1 Webb App Exploits
  2. 16.2 Injection Attacks
  3. 16.3 HTML Injection
  4. 16.4 SQL Hacking – SQLmap Act
  5. 16.5 Cross-Site Attacks
  6. 16.6 Cross-Site Request Forgery
  7. 16.7 Other Web-based Attacks
  8. 16.8 File Inclusion Attacks
  9. 16.9 Web Shells
  10. 16.10 Web Shells Review
Chapter Seventeen:

PenTest : 17 – Lateral Movement

  1. 17.1 Lateral Movement
  2. 17.2 Lateral Movement with Remote Mgmt Services
  3. 17.3 Process Migration Act
  4. 17.4 Passing Control Act
  5. 17.5 Pivoting
  6. 17.6 Tools the Enable Pivoting
  7. 17.7 Lateral Movement Review
Chapter Eighteen:

PenTest : 18 – Persistence

  1. 18.1 Persistence
  2. 18.2 Breeding RATS Act
  3. 18.3 Bind and Reverse Shells
  4. 18.4 Bind Shells Act
  5. 18.5 Reverse Shells
  6. 18.6 Reverse Shells Act
  7. 18.7 Netcat
  8. 18.8 Netcat Act
  9. 18.9 Scheduled Tasks
  10. 18.10 Scheduled Tasks Act
  11. 18.11 Services and Domains
  12. 18.12 Persistence Review
Chapter Ninteen:

PenTest : 19 – Cover Your Tracks

  1. 19.1 Cover Your Tracks
  2. 19.2 Cover Your Tracks – Timestomp Files Act
  3. 19.3 Cover Your Tracks – Frame the Administrator Act
  4. 19.4 Cover Your Tracks – Clear the Event Log Act
  5. 19.5 Cover Your Tracks Review
Chapter Twenty:

PenTest : 20 – The Report

  1. 20.1 The Report
  2. 20.2 The Report Review
Chapter Twenty One:

PenTest : 21 – Post Engagement Cleanup

  1. 21.1 Post Engagement Cleanup
  2. 21.1 Post Engagement Cleanup_1
  3. 21.3 Post Engagement Cleanup Review
  4. 21.4 PenTest Plus Conclusion.mp4

$100

Share on:

You Will Get Certification After Completion of This Course.

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Related Products

Description

CompTIA PenTest+ (PT0-001) – Penetration Testing

The CompTIA PenTest+ (PT0-001) certification program is a comprehensive training designed for cybersecurity professionals who seek to specialize in penetration testing and vulnerability assessment. This certification validates the knowledge and skills required to conduct thorough penetration tests to identify, exploit, report, and manage vulnerabilities in an organization’s network and applications. Covering a broad range of topics such as information gathering, attacks and exploits, post-exploitation techniques, and reporting, the PenTest+ certification equips participants with the expertise to protect and secure IT environments. It is ideal for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to enhance their offensive security capabilities.

Key Features:

  • Planning and Scoping: Learn the initial stages of penetration testing, including defining the scope, understanding legal and compliance considerations, and developing a detailed test plan to ensure a structured and compliant approach.
  • Information Gathering and Vulnerability Identification: Gain proficiency in reconnaissance techniques, using tools and methods for information gathering, network scanning, and vulnerability identification to uncover potential security weaknesses.
  • Attacks and Exploits: Explore various attack techniques and exploitation methods, understanding how to leverage discovered vulnerabilities to gain unauthorized access and achieve specific testing objectives.
  • Post-Exploitation Techniques: Learn the techniques used after exploiting a system, such as maintaining access, pivoting through networks, and collecting data, to further assess the depth of a security breach.
  • Reporting and Communication: Develop skills in documenting findings and creating detailed penetration test reports. Learn to effectively communicate results, risks, and recommendations to stakeholders and technical teams.
  • Tools and Technologies: Hands-on training with popular penetration testing tools such as Metasploit, Nmap, Burp Suite, and Wireshark. Understand tool functionalities, configurations, and best practices for effective testing.
  • Penetration Testing Methodologies: Study industry-standard methodologies and frameworks, including the Penetration Testing Execution Standard (PTES) and the Open Web Application Security Project (OWASP), ensuring a systematic and professional approach.
  • Ethical Hacking Principles: Emphasize the importance of ethical hacking practices, ensuring penetration tests are conducted responsibly, legally, and ethically, in accordance with industry standards.
  • Network and Application Security: Assess the security of network infrastructures and applications, testing for common vulnerabilities such as SQL injection, cross-site scripting (XSS), buffer overflows, and more.
  • Risk Analysis and Mitigation: Learn to analyze and prioritize risks associated with discovered vulnerabilities. Develop strategies for mitigating these risks and recommending appropriate remediation actions.

This CompTIA PenTest+ (PT0-001) certification program is perfect for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to develop their skills in offensive security. Completing this certification equips participants with the capabilities to identify, exploit, and mitigate security vulnerabilities, ensuring their organizations can maintain a strong security posture.


Talk to a Career Coach!


Train & Earn with Guaranteed Career Coaching Success!

3 reviews for CompTIA PenTest+ (PT0-001) – Penetration Testing

  1. Jessica Lin

    I really appreciated how IT Tutor Pro broke down complex penetration testing tools and processes into understandable steps. The focus on both manual techniques and automated tools gave me a well-rounded understanding. This course definitely gave me the confidence to sit for the PenTest+ exam.

  2. Sophia Grant

    What I loved most about this course was the emphasis on actual penetration testing workflows. IT Tutor Pro didn’t just teach me the tools, they showed me how to think like a pentester — from information gathering to reporting findings. I feel ready to pass the exam and apply these skills professionally.

  3. Rohan Kapoor

    The PenTest+ PT0-001 course from IT Tutor Pro was exactly what I was looking for. It covered everything from planning and scoping to hands-on exploitation techniques. The practical labs were incredibly helpful in developing my penetration testing skills. Highly recommended for anyone pursuing ethical hacking.

Add a review

Your email address will not be published. Required fields are marked *