Autoplay
Autocomplete
Previous Lesson
Complete and Continue
TOTAL: CompTIA PenTest+ (PT0-002)
Section 0 : Introduction to CompTIA PenTest+ (PT0-002)
1. Promo (0:56)
2. Introduction to the CompTIA PenTest+ (PT0-002) Course (8:40)
3. About the CompTIA PenTest+ (PT0-002) Exam (7:21)
Section 1 : Planning and Engagement
1. Planning a Pen Test (8:21)
2. Rules of Engagement (10:28)
3. Regulatory Compliance (4:23)
4. Resources and Budgets (7:07)
5. Impact and Constraints (5:06)
6. Support Resources (13:14)
7. Legal Groundwork (11:43)
8. Service Provider Agreements (2:12)
9. Standards and Methodologies, Part 1 (6:48)
10. Standards and Methodologies, Part 2 (9:17)
11. Environmental and Scoping Considerations (13:38)
12. Ethical Mindset (5:36)
13. Lab Environment Setup (17:32)
14. Project Strategy and Risk (9:12)
15. Scope Vulnerabilities (13:19)
16. Compliance-Based Assessments (4:08)
Quiz
Section 2 : Information Gathering and Vulnerability Scanning
1. Scanning and Enumeration (4:16)
2. Scanning and Demo (10:46)
3. Packet Investigation (7:57)
4. Packet Inspection Demo (5:48)
5. Labtainers Setup (12:09)
6. Labtainers Lab (Wireshark) (8:54)
7. Application and Open-Source Resources (11:38)
8. Passive Reconnaissance (10:07)
9. Active Reconnaissance (7:50)
10. Vulnerability Scanning (8:41)
11. Vulnerability Scanning Demo (16:20)
12. Labtainers Lab (Network Basics) (2:50)
13. Labtainers Lab (Nmap Discovery) (3:12)
14. Target Considerations (15:36)
15. Analyzing Scan Output (5:01)
16. Nmap Scoping and Output Options (21:04)
17. Nmap Timing and Performance Options (6:31)
18. Prioritization of Vulnerabilities (9:07)
19. Common Attack Techniques (12:05)
20. Automating Vulnerability Scans (3:35)
21. Credential Attacks (14:31)
22. Labtainers Lab (Password Cracking) (2:23)
23. Labtainers Lab (Secure Socket Layers) (2:30)
24. Labtainers Lab (Routing Basics) (1:59)
Quiz
Section 3 : Network-Based Attacks
1. Exploit Resources and Network Attacks (4:37)
2. Network-Based Exploits (7:07)
3. FTP Exploit Demo (8:14)
4. Man-in-the-Middle Exploits (7:06)
5. Labtainers Lab (TCP/IP Attacks) (2:09)
6. Labtainers Lab (ARP Spoof Attack) (1:53)
7. Labtainers Lab (Local DNS Attacks) (1:47)
8. Labtainers Lab (MACs and Hash Functions) (1:19)
Quiz
Section 4 : Wireless and RF Attacks
1. Wireless Exploits, Part 1 (13:17)
2. Wireless Exploits, Part 2 (2:46)
3. Antennas (3:48)
Quiz
Section 5 : Web and Database Attacks
1. OWASP Top 10 (8:40)
2. Application Exploits, Part 1 (5:34)
3. SQL Injection Demo (8:41)
4. Labtainers Lab (SQL Injection) (2:38)
5. Application Exploits, Part 2 (8:02)
6. Application Exploits, Part 3 (9:11)
7. Cross-Site Scripting Demo (7:00)
8. Labtainers Lab (Cross-Site Scripting) (1:36)
9. Labtainers Lab (Cross-Site Request Forgery) (1:14)
10. Code Vulnerabilities (16:36)
11. API Attacks and Attack Resources (6:28)
12. Privilege Escalation (Linux) (9:37)
13. Privilege Escalation (Windows) (6:09)
14. Misc. Privilege Escalation (7:54)
15. Misc. Local Host Vulnerabilities (8:05)
Quiz
Section 6 : Attacking the Cloud
1. Cloud Attacks, Part 1 (4:50)
2. Cloud Attacks, Part 2 (4:39)
Quiz
Section 7 : Specialized and Fragile Systems
1. Mobile Attacks (10:25)
2. IoT Attacks (10:18)
3. Data Storage and Management Interface Attacks (8:58)
4. Virtual and Containerized Environment Attacks (7:31)
5. Labtainers Lab (Industrial Control System) (1:51)
Quiz
Section 8 : Social Engineering and Physical Attacks
1. Pretext for a Social Engineering Attack (2:31)
2. Remote Social Engineering (6:10)
3. Spear Phishing Demo (10:09)
4. In-Person Social Engineering (11:45)
5. Physical Security (11:17)
Quiz
Section 9 : Post-Exploitation
1. Post-Exploitation Techniques (11:07)
2. Post-Exploitation Tools (3:22)
3. Network Segmentation Testing (3:00)
4. Persistence and Stealth (10:45)
5. Detection Avoidance Techniques (6:16)
Quiz
Section 10 : Post-Engagement Activities
1. Report Writing (14:47)
2. Important Components of Written Reports (2:37)
3. Mitigation Strategies (5:00)
4. Technical and Physical Controls (3:46)
5. Administrative and Operational Controls (5:10)
6. Communication (8:38)
7. Presentation of Findings (2:57)
8. Post-Report Activities (5:23)
9. Data Destruction Process (1:37)
Quiz
Section 11 : Tools and Code Analysis
1. Using Scripting in Pen Testing (12:32)
2. Bash Scripting Basics (14:55)
3. Bash Scripting Techniques (10:11)
4. PowerShell Scripts (4:02)
5. Ruby Scripts (6:32)
6. Python Scripts (5:45)
7. Scripting Languages Comparison (10:56)
8. Data Structures, Part 1 (7:41)
9. Data Structures, Part 2 (8:12)
10. Libraries (3:03)
11. Classes (8:05)
12. Procedures and Functions (5:48)
13. Perl and Javascript (5:41)
Quiz
Section 12 : Tools Inventory
1. Pen Testing Toolbox (6:46)
2. Using Kali Linux (6:14)
3. Scanners and Credential Tools (9:52)
4. Code Cracking Tools (4:20)
5. Open-Source Research Tools (6:21)
6. Wireless and Web Pen Testing Tools (10:48)
7. Remote Access Tools (6:15)
8. Analyzers and Mobile Pen Testing Tools (2:29)
9. Other Pen Testing Tools (4:19)
10. Labtainers Lab (Metasploit Framework) (2:00)
11. Labtainers Lab (Wireshark Packet Inspection) (1:44)
12. Labtainers Lab (SSH) (0:58)
13. Scanners, Debuggers, and Wireless Tools (9:51)
14. Web, Steganography, and Cloud Tools (9:08)
Quiz
Audio Version of Training
Audio Download
19. Common Attack Techniques
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock