CompTIA PenTest+ (PT0-001) – Penetration Testing

Closed Caption

Certificate

Dedicated Tutors

217 Videos
26 Hours
249 Test Questions

CompTIA PenTest+ (PT0-001) – Penetration Testing

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

26 Hours
217 Videos

CompTIA PenTest+ (PT0-001) – Penetration Testing

Course Description

26 Hours

217 Videos

CompTIA PenTest+ (PT0-001) – Penetration Testing

The CompTIA PenTest+ (PT0-001) certification program is a comprehensive training designed for cybersecurity professionals who seek to specialize in penetration testing and vulnerability assessment. This certification validates the knowledge and skills required to conduct thorough penetration tests to identify, exploit, report, and manage vulnerabilities in an organization’s network and applications. Covering a broad range of topics such as information gathering, attacks and exploits, post-exploitation techniques, and reporting, the PenTest+ certification equips participants with the expertise to protect and secure IT environments. It is ideal for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to enhance their offensive security capabilities.

Key Features:

  • Planning and Scoping: Learn the initial stages of penetration testing, including defining the scope, understanding legal and compliance considerations, and developing a detailed test plan to ensure a structured and compliant approach.
  • Information Gathering and Vulnerability Identification: Gain proficiency in reconnaissance techniques, using tools and methods for information gathering, network scanning, and vulnerability identification to uncover potential security weaknesses.
  • Attacks and Exploits: Explore various attack techniques and exploitation methods, understanding how to leverage discovered vulnerabilities to gain unauthorized access and achieve specific testing objectives.
  • Post-Exploitation Techniques: Learn the techniques used after exploiting a system, such as maintaining access, pivoting through networks, and collecting data, to further assess the depth of a security breach.
  • Reporting and Communication: Develop skills in documenting findings and creating detailed penetration test reports. Learn to effectively communicate results, risks, and recommendations to stakeholders and technical teams.
  • Tools and Technologies: Hands-on training with popular penetration testing tools such as Metasploit, Nmap, Burp Suite, and Wireshark. Understand tool functionalities, configurations, and best practices for effective testing.
  • Penetration Testing Methodologies: Study industry-standard methodologies and frameworks, including the Penetration Testing Execution Standard (PTES) and the Open Web Application Security Project (OWASP), ensuring a systematic and professional approach.
  • Ethical Hacking Principles: Emphasize the importance of ethical hacking practices, ensuring penetration tests are conducted responsibly, legally, and ethically, in accordance with industry standards.
  • Network and Application Security: Assess the security of network infrastructures and applications, testing for common vulnerabilities such as SQL injection, cross-site scripting (XSS), buffer overflows, and more.
  • Risk Analysis and Mitigation: Learn to analyze and prioritize risks associated with discovered vulnerabilities. Develop strategies for mitigating these risks and recommending appropriate remediation actions.

This CompTIA PenTest+ (PT0-001) certification program is perfect for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to develop their skills in offensive security. Completing this certification equips participants with the capabilities to identify, exploit, and mitigate security vulnerabilities, ensuring their organizations can maintain a strong security posture.

Course Syllabus

PenTest : 1 – The PenTest Engagement

  1. 1.0 PenTest Plus Introduction
  2. 1.1 PenTest Plus Topics
  3. 1.2 PenTest Engagement
  4. 1.3 Threat Modeling
  5. 1.4 Technical Constraints
  6. 1.5 PenTest Engagement Review
  7. 1.6 Examining PenTest Engagement Documents Act

PenTest : 2 – Passive Reconnaissance

  1. 2.1 Passive Reconnaissance part1
  2. 2.2 WHOIS Act
  3. 2.3 Passive Reconnaissance part2
  4. 2.4 Google Hacking Act
  5. 2.5 Passive Reconnaissance part3
  6. 2.6 DNS Querying Act
  7. 2.7 Passive Reconnaissance part4
  8. 2.8 Email Server Querying Act
  9. 2.9 SSL-TLS Cerfificates
  10. 2.10 Shodan Act
  11. 2.11 The Havester
  12. 2.12 TheHarvester Act
  13. 2.13 Recon-ng
  14. 2.14 Recon-g Act
  15. 2.14 Recon-ng-Part-2-API-key Act
  16. 2.15 Maltego
  17. 2.16 Have I been Pwned
  18. 2.17 Punked and Owned Pwned Act
  19. 2.18 Fingerprinting Organization with Collected Archives
  20. 2.19 FOCA Act
  21. 2.20 Findings Analysis Weaponization
  22. 2.21 Chp 2 Review

PenTest : 3 – Active Reconnaissance

  1. 3.1 Active Reconnaissannce
  2. 3.2 Discovery Scans Act
  3. 3.3 Nmap
  4. 3.4 Nmap Scans Types Act
  5. 3.5 Nmap Options
  6. 3.6 Nmap Options Act
  7. 3.7 Stealth Scans
  8. 3.8 Nmap Stealth Scans Act
  9. 3.9 Full Scans
  10. 3.10 Full Scans Act
  11. 3.11 Packet Crafting
  12. 3.12 Packet Crafting Act
  13. 3.13 Network Mapping
  14. 3.14 Metasploit
  15. 3.15 Scanning with Metasploit Act
  16. 3.16 Enumeration
  17. 3.17 Banner Grabbing Act
  18. 3.18 Windows Host Enumeration
  19. 3.19 Winddows Host Enumeration Act
  20. 3.20 Linux Host Enumeration
  21. 3.21 Linux Host Enumeration Act
  22. 3.22 Service Enumeration
  23. 3.23 Service Enumeration Act
  24. 3.24 Network Shares
  25. 3.25 SMB Share Enumeration Act
  26. 3.26 NFS Network Share Enumeration
  27. 3.27 NFS Share Enumeration Act
  28. 3.28 Null Sessions
  29. 3.29 Null Sessions Act
  30. 3.30 Website Enumeration
  31. 3.31 Website Enumeration Act
  32. 3.32 Vulnerability Scans
  33. 3.33 Compliance Scans Act
  34. 3.34 Credentialed Non-credentialed Scans
  35. 3.35 Using Credentials in Scans Act
  36. 3.36 Server Service Vulnerability Scan
  37. 3.37 Vulnerability Scanning Act
  38. 3.38 Web Server Database Vulnerability Scan
  39. 3.39 SQL Vulnerability Scanning Act
  40. 3.40 Vulnerability Scan Part 2 OpenVAS Act
  41. 3.41 Web App Vulnerability Scan
  42. 3.42 Web App Vulnerability Scanning Act
  43. 3.43 Network Device Vulnerability Scan
  44. 3.44 Network Device Vuln Scanning Act
  45. 3.45 Nmap Scripts
  46. 3.46 Using Nmap Scripts for Vuln Scanning Act
  47. 3.47 Packet Crafting for Vulnerbility Scans
  48. 3.48 Firewall Vulnerability Scans
  49. 3.49 Wireless Access Point Vunerability
  50. 3.50 Wireless AP Scans Act
  51. 3.51 WAP Vulnerability Scans
  52. 3.52 Container Security issues
  53. 3.53 How to Update Metasploit Pro Expired Trial License

PenTest : 4 – Physical Security

  1. 4.1 Physical Security
  2. 4.2 Badge Cloning Act
  3. 4.3 Physical Security Review

PenTest : 5 – Social Engineering

  1. 5.1 Social Engineering
  2. 5.2 Using Baited USB Stick Act
  3. 5.3 Using Social Enginnering to Assist Attacks
  4. 5.4 Phishing Act
  5. 5.5 Social Engineering Review

PenTest : 6 – Vulnerability Scan Analysis

  1. 6.1 Vulnerbility Scan Analysis
  2. 6.2 Validating Vulnerability Scan Results Act
  3. 6.3 Vulnerbility Scan Analysis Review

PenTest : 7 – Password Cracking

  1. 7.1 Password Cracking
  2. 7.2 Brute Force Attack Against Network Service Act
  3. 7.3 Network Authentication Interception Attack
  4. 7.4 Intercepting Network Authentication Act
  5. 7.5 Pass the Hash Attacks
  6. 7.6 Pass the Hash Act
  7. 7.7 Password Cracking Review

PenTest : 8 – Penetrating Wired Networks

  1. 8.1 Penetrating Wired Network
  2. 8.2 Sniffing Act
  3. 8.3 Eavesdropping
  4. 8.4 Eavesdropping Act
  5. 8.5 ARP Poisoning
  6. 8.6 ARP Poisoning Act
  7. 8.7 Man In The Middle
  8. 8.8 MITM Act
  9. 8.9 TCP Session HiJacking
  10. 8.10 Server Message Blocks SMB Exploits
  11. 8.11 SMB Attack Act
  12. 8.12 Web Server Attacks
  13. 8.13 FTP Attacks
  14. 8.14 Telnet Server Attacks
  15. 8.15 SSH Server Attacks
  16. 8.16 Simple Network Mgmt Protocol SNMP
  17. 8.17 Simple Mail Transfer Protocol SMTP
  18. 8.18 Domain Name System DNS Cache Poisoning
  19. 8.19 Denail of Service Attack DoS-DDoS
  20. 8.20 DoS Attack Act
  21. 8.21 VLAN Hopping Review

PenTest : 9 – Penetrating Wireless Networks

  1. 9.1 Penetrating Wireless Networks
  2. 9.2 Jamming Act
  3. 9.3 Wireless Sniffing
  4. 9.4 Replay Attacks
  5. 9.5 WEP Cracking Act
  6. 9.6 WPA-WPA2 Cracking
  7. 9.7 WAP Cracking Act
  8. 9.8 Evil Twin Attacks
  9. 9.9 Evil Twin Attack Act
  10. 9.10 WiFi Protected Setup
  11. 9.11 Bluetooth Attacks
  12. 9.12 Penetrating Wireless Networks

PenTest : 10 – Windows Exploits

  1. 10.1 Windows Exploits
  2. 10.2 Dumping Stored Passwords Act
  3. 10.3 Dictionary Attacks
  4. 10.4 Dictionary Attack Against Windows Act
  5. 10.5 Rainbow Table Attacks
  6. 10.6 Credential Brute Force Attacks
  7. 10.7 Keylogging Attack Act
  8. 10.8 Windows Kernel
  9. 10.9 Kernel Attack Act
  10. 10.10 Windows Components
  11. 10.11 Memory Vulnerabilities
  12. 10.12 Buffer Overflow Attack Act
  13. 10.13 Privilegde Escalation in Windows
  14. 10.14 Windows Accounts
  15. 10.15 Net and WMIC Commands
  16. 10.16 Sandboxes

PenTest : 11 – Linux Exploits

  1. 11.1 Linux Exploits
  2. 11.2 Exploiting Common Linux Features Act
  3. 11.3 Password Cracking in Linux
  4. 11.4 Cracking Linux Passwords Act
  5. 11.5 Vulnerability Linux
  6. 11.6 Priviledge Escalation Linux
  7. 11.7 Linux Accounts
  8. 11.8 Linux Exploits Review

PenTest : 12 – Mobile Devices

  1. 12.1 Mobile Devices
  2. 12.2 Hacking Android Act
  3. 12.3 Apple Exploits
  4. 12.4 Moblie Devices Review

PenTest : 13 – Specialized Systems

  1. 13.1 Specialized Systems
  2. 13.2 Specialized Systems Review

PenTest : 14 – Scripts

  1. 14.1 Scripts
  2. 14.2 Powershell
  3. 14.3 Python
  4. 14.4 Ruby
  5. 14.5 Common Scripting Elements
  6. 14.6 Scripts Review
  7. 14.7 Better Ping Sweep
  8. 14.8 Simple Port Scanner2
  9. 14.9 Multitarget Port Scanner
  10. 14.10 Port Scanner with Nmap
  11. 14.11 Scripts Review

PenTest : 15 – Application Testing

  1. 15.1 Application Testing
  2. 15.2 Reverse Engineering

PenTest : 16 – Web App Exploits

  1. 16.1 Webb App Exploits
  2. 16.2 Injection Attacks
  3. 16.3 HTML Injection
  4. 16.4 SQL Hacking – SQLmap Act
  5. 16.5 Cross-Site Attacks
  6. 16.6 Cross-Site Request Forgery
  7. 16.7 Other Web-based Attacks
  8. 16.8 File Inclusion Attacks
  9. 16.9 Web Shells
  10. 16.10 Web Shells Review

PenTest : 17 – Lateral Movement

  1. 17.1 Lateral Movement
  2. 17.2 Lateral Movement with Remote Mgmt Services
  3. 17.3 Process Migration Act
  4. 17.4 Passing Control Act
  5. 17.5 Pivoting
  6. 17.6 Tools the Enable Pivoting
  7. 17.7 Lateral Movement Review

PenTest : 18 – Persistence

  1. 18.1 Persistence
  2. 18.2 Breeding RATS Act
  3. 18.3 Bind and Reverse Shells
  4. 18.4 Bind Shells Act
  5. 18.5 Reverse Shells
  6. 18.6 Reverse Shells Act
  7. 18.7 Netcat
  8. 18.8 Netcat Act
  9. 18.9 Scheduled Tasks
  10. 18.10 Scheduled Tasks Act
  11. 18.11 Services and Domains
  12. 18.12 Persistence Review

PenTest : 19 – Cover Your Tracks

  1. 19.1 Cover Your Tracks
  2. 19.2 Cover Your Tracks – Timestomp Files Act
  3. 19.3 Cover Your Tracks – Frame the Administrator Act
  4. 19.4 Cover Your Tracks – Clear the Event Log Act
  5. 19.5 Cover Your Tracks Review

PenTest : 20 – The Report

  1. 20.1 The Report
  2. 20.2 The Report Review

PenTest : 21 – Post Engagement Cleanup

  1. 21.1 Post Engagement Cleanup
  2. 21.1 Post Engagement Cleanup_1
  3. 21.3 Post Engagement Cleanup Review
  4. 21.4 PenTest Plus Conclusion.mp4

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

Share on:

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

$99.95

$99.95

Share on:

You Will Get Certification After Completion of This Course.

$99.95

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Recently Viewed

Products not found

Description

CompTIA PenTest+ (PT0-001) – Penetration Testing

The CompTIA PenTest+ (PT0-001) certification program is a comprehensive training designed for cybersecurity professionals who seek to specialize in penetration testing and vulnerability assessment. This certification validates the knowledge and skills required to conduct thorough penetration tests to identify, exploit, report, and manage vulnerabilities in an organization’s network and applications. Covering a broad range of topics such as information gathering, attacks and exploits, post-exploitation techniques, and reporting, the PenTest+ certification equips participants with the expertise to protect and secure IT environments. It is ideal for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to enhance their offensive security capabilities.

Key Features:

  • Planning and Scoping: Learn the initial stages of penetration testing, including defining the scope, understanding legal and compliance considerations, and developing a detailed test plan to ensure a structured and compliant approach.
  • Information Gathering and Vulnerability Identification: Gain proficiency in reconnaissance techniques, using tools and methods for information gathering, network scanning, and vulnerability identification to uncover potential security weaknesses.
  • Attacks and Exploits: Explore various attack techniques and exploitation methods, understanding how to leverage discovered vulnerabilities to gain unauthorized access and achieve specific testing objectives.
  • Post-Exploitation Techniques: Learn the techniques used after exploiting a system, such as maintaining access, pivoting through networks, and collecting data, to further assess the depth of a security breach.
  • Reporting and Communication: Develop skills in documenting findings and creating detailed penetration test reports. Learn to effectively communicate results, risks, and recommendations to stakeholders and technical teams.
  • Tools and Technologies: Hands-on training with popular penetration testing tools such as Metasploit, Nmap, Burp Suite, and Wireshark. Understand tool functionalities, configurations, and best practices for effective testing.
  • Penetration Testing Methodologies: Study industry-standard methodologies and frameworks, including the Penetration Testing Execution Standard (PTES) and the Open Web Application Security Project (OWASP), ensuring a systematic and professional approach.
  • Ethical Hacking Principles: Emphasize the importance of ethical hacking practices, ensuring penetration tests are conducted responsibly, legally, and ethically, in accordance with industry standards.
  • Network and Application Security: Assess the security of network infrastructures and applications, testing for common vulnerabilities such as SQL injection, cross-site scripting (XSS), buffer overflows, and more.
  • Risk Analysis and Mitigation: Learn to analyze and prioritize risks associated with discovered vulnerabilities. Develop strategies for mitigating these risks and recommending appropriate remediation actions.

This CompTIA PenTest+ (PT0-001) certification program is perfect for penetration testers, vulnerability analysts, security analysts, and IT professionals aiming to develop their skills in offensive security. Completing this certification equips participants with the capabilities to identify, exploit, and mitigate security vulnerabilities, ensuring their organizations can maintain a strong security posture.

Reviews

There are no reviews yet.

Be the first to review “CompTIA PenTest+ (PT0-001) – Penetration Testing”

Your email address will not be published. Required fields are marked *

preloader