Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Total: CompTIA PenTest+ v3
Course Overview
Course Description
Video Overview (0:52)
Introduction to CompTIA PenTest+ (PT0-003)
Introduction to the CompTIA PenTest+ (PT0-003) Course (1:46)
Promo (0:52)
About the CompTIA PenTest+ (PT0-003) Exam (6:07)
Planning and Engagement
Planning a Pen Test (8:16)
Rules of Engagement (10:22)
Collaboration and Commuication (2:49)
Regulatory Compliance (4:15)
Impact and Constraints (5:00)
Legal Groundwork (11:38)
Standards and Methodologies, Part 1 (6:41)
Standards and Methodologies, Part 2 (9:10)
Standards and Methodologies, Part 3 and Threat Modeling Framwworks (3:56)
Environmental and Scoping Considerations (13:31)
Lab Environment Setup (18:52)
Project Strategy and Risk (9:07)
Quiz : Planning and Engagement
Information Gathering and Vulnerability Scanning
Scanning Demo (10:43)
Scanning and Enumeration (3:55)
Packet Investigation (7:44)
Packet Inspection Demo (5:45)
Labtainers Setup (12:05)
Labtainers Lab (Wireshark) (8:52)
Application and Open-Source Resources (10:59)
Prioritize and Prepare Attacks (3:48)
Passive Reconnaissance (9:55)
Active Reconnaissance (7:41)
Additional Eumeration Techniques (2:49)
Vulnerability Scanning (8:31)
Vulnerability Scanning Demo (16:15)
Labtainers Lab (Network Basics) (2:55)
Labtainers Lab (Nmap Discovery) (3:14)
Target Considerations (15:22)
Analyzing Scan Output (6:13)
Nmap Scoping and Output Options (20:55)
Nmap Timing and Performance Options (6:25)
Prioritization of Vulnerabilities (8:54)
Common Attack Techniques (11:58)
Automating Vulnerability Scans (3:32)
Credential Attacks (14:19)
Labtainers Lab (Password Cracking) (2:28)
Labtainers Lab (Secure Socket Layers) (2:34)
Labtainers Lab (Routing Basics) (2:05)
Quiz : Information Gathering and Vulnerability Scanning
Network-Based Attacks
Network-Based Exploits (7:00)
Authentication Attacks (2:53)
FTP Exploit Demo (8:12)
Man-in-the-Middle Exploits (7:00)
Labtainers Lab (TCP/IP Attacks) (2:15)
Labtainers Lab (ARP Spoof Attack) (1:59)
Labtainers Lab (Local DNS Attacks) (1:53)
Labtainers Lab (MACs and Hash Functions) (1:26)
Quiz : Network-Based Attacks
Wireless and RF Attacks
Wireless Exploits, Part 1 (13:10)
Wireless Exploits, Part 2 (2:40)
Quiz : Wireless and RF Attacks
Web and Database Attacks
Application Exploits, Part 1 (5:23)
SQL Injection Demo (8:32)
Labtainers Lab (SQL Injection) (2:39)
Application Exploits, Part 2 (7:57)
Application Exploits, Part 3 (8:56)
Cross-Site Scripting Demo (6:54)
Labtainers Lab (Cross-Site Scripting) (1:42)
Labtainers Lab (Cross-Site Request Forgery) (1:20)
API Attacks and Attack Resources (6:18)
Privilege Escalation (Linux) (9:31)
Privilege Escalation (Windows) (6:01)
Misc. Privilege Escalation (7:50)
Misc. Local Host Vulnerabilities (8:00)
Additional Local Host Vulnerabilities (2:54)
Quiz : Web and Database Attacks
New section
Cloud Attacks, Part 2 (4:34)
Cloud Attacks, Part 1 (4:46)
Quiz : Attacking the Cloud
Specialized and Fragile Systems
Mobile Attacks (10:16)
Virtual and Containerized Environment Attacks (7:21)
Labtainers Lab (Industrial Control System) (1:58)
Quiz : Specialized and Fragile Systems
New section
Remote Social Engineering (5:59)
Pretext for a Social Engineering Attack (2:26)
Spear Phishing Demo (10:02)
In-Person Social Engineering (11:36)
Physical Security (11:09)
Quiz : Social Engineering and Physical Attacks
Post-Exploitation
More Post-Exploitation Techniques (4:18)
Post-Exploitation Techniques (11:04)
Post-Exploitation Tools (3:18)
Network Segmentation Testing (2:47)
Persistence and Stealth (10:36)
Detection Avoidance Techniques (6:08)
More Detection Avoidance Techniques (2:51)
Quiz : Post-Exploitation
Post-Engagement Activities
Report Writing (14:41)
Important Components of Written Reports (2:33)
Mitigation Strategies (4:55)
Technical and Physical Controls (3:43)
Administrative and Operational Controls (5:02)
Communication (8:34)
Presentation of Findings (2:53)
Post-Report Activities (5:18)
Data Destruction Process (1:31)
Quiz : Post-Engagement Activities
Tools and Code Analysis
Bash Scripting Basics (14:50)
Using Scripting in Pen Testing (12:28)
Bash Scripting Techniques (10:03)
PowerShell Scripting Basics (3:59)
Ruby Scripts (6:25)
Python Scripts (5:42)
Scripting Languages Comparison (10:47)
Data Structures, Part 1 (7:33)
Data Structures, Part 2 (8:06)
Libraries (2:53)
Classes (7:57)
Procedures and Functions (5:41)
Perl and Javascript (5:35)
Breach and Attack Simulation (1:46)
Quiz : Tools and Programming
Tools Inventory
Pen Testing Toolbox (6:41)
More Pen Testing Toolbox Tools (3:25)
Using Kali Linux (6:08)
Scanners and Credential Tools (9:43)
Open-Source Research Tools (6:17)
Wireless and Web Pen Testing Tools (10:45)
More Wireless and Web Pen Testing Tools (2:12)
Remote Access Tools (6:11)
Analyzers and Mobile Pen Testing Tools (2:26)
Other Pen Testing Tools (4:12)
Even More Pen Testing Tools (2:36)
Labtainers Lab (Metasploit Framework) (2:06)
Labtainers Lab (Wireshark Packet Inspection) (1:50)
Labtainers Lab (SSH) (1:05)
Scanners, Debuggers, and Wireless Tools (9:41)
More Scanners, Debuggers, and Wireless Tools (2:05)
Web, Steganography, and Cloud Tools (8:58)
Quiz : Tools Inventory
Next Steps & Certification
How to Book Your CompTIA Exam (Voucher Info)
Audio Version of Training
Audio Download
Web, Steganography, and Cloud Tools
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock