Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Pentest+ (PT0-001): Complete Course & Practice Exam
Training Overview
Description of Training
Video Overview (5:04)
Introduction
Welcome to the Course (4:17)
Exam Foundations (4:44)
Domain 1: Planning and Scoping 11 Lectures
Planning and Scoping (Overview) (1:27)
Penetration Testing Methodology (3:02)
Planning a Penetration Test (8:07)
Rules of Engagement (5:39)
Legal Concepts (11:00)
Testing Strategies (3:04)
White Box Support Resources (6:34)
Types of Assessments (5:47)
Threat Actors (7:41)
Target Selection (5:15)
Other Scoping Considerations (7:10)
Domain 1 Quiz
Domain 2: Information Gathering and Vulnerability Identification
Information Gathering and Vulnerability Identification (Overview) (2:40)
Information Gathering (10:11)
Reconnaissance Demo with CentralOps (demo) (13:18)
Scanning and Enumeration (4:30)
Fingerprinting (4:19)
Scanning and Enumation (demo) (15:59)
Cryptographic Inspection (1:32)
Eavesdropping (3:24)
Decompiling and Debugging (2:52)
Open Source Research (6:17)
Vulnerability Scanning (8:51)
Scanning Considerations (5:40)
Application and Container Scans (2:56)
Analyzing Vulnerability Scans (7:11)
Leverage Information for Exploit (3:23)
Common Attack Vectors (6:26)
Weaknesses in Specialized Systems (10:31)
Domain 2 Quiz
Domain 3: Attacks and Exploits
Attacks and Exploits (Overview) (2:00)
Social Engineering (12:18)
Motivation Factors (7:15)
Physical Security Attacks (5:30)
Lock Picking (Demo) (1:28)
Network-based Vulnerabilities (13:47)
Wireless-based Vulnerabilities (8:48)
Wireless Network Attack (demo) (5:52)
Application-based Vulnerabilities (18:54)
Local Host Vulnerabilities (3:01)
Privilege Escalation (Linux) (4:51)
Privilege Escalation (Windows) (10:43)
Privilege Escalation (5:10)
Privilege Escalation (Demo) (4:32)
Lateral Movement (9:12)
Persistence (6:50)
Covering Your Tracks (5:40)
Persistence and Covering Tracks (demo) (7:52)
Domain 3 Quiz
Domain 4: Penetration Testing Tools
Penetration Testing Tools (Overview) (2:48)
Nmap Usage (10:16)
Nmap Usage (demo) (11:54)
Use Cases for Tools (7:28)
Scanners (2:07)
Credential Testing Tools (6:44)
John the Ripper (demo) (2:19)
Debuggers (2:41)
Software Assurance (2:13)
OSINT (4:49)
Wireless (1:48)
Web Proxy (8:58)
Social Engineering Tools (1:17)
Remote Access tools (7:24)
Networking Tools (1:34)
Mobile Tools (2:05)
Miscellaneous Tools (4:28)
Intro to Programming (2:57)
Programming Concepts (21:51)
BASH Script Example (4:33)
Python Script Example (3:45)
PowerShell Script Example (3:27)
Ruby Script Example (4:28)
Domain 4 Quiz
Domain 5: Reporting and Communication
Reporting and Communication (Overview) (1:54)
Pentest Communications (8:41)
Report Writing (7:58)
Mitigation Strategies (7:27)
Post-Report Activities (4:20)
Pentest Report Example (0:46)
Domain 5 Quiz
Conclusion
Conclusion (1:59)
Creating Your Pentest Lab (9:08)
Practice Exam
Practice Exam
Privilege Escalation (Demo)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock