Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Total: CompTIA PenTest+ v3
Course Overview
Course Description
Video Overview (0:52)
Introduction to CompTIA PenTest+ (PT0-003)
Introduction to the CompTIA PenTest+ (PT0-003) Course (1:46)
Promo (0:52)
About the CompTIA PenTest+ (PT0-003) Exam (6:07)
Planning and Engagement
Planning a Pen Test (8:16)
Rules of Engagement (10:22)
Collaboration and Commuication (2:49)
Regulatory Compliance (4:15)
Impact and Constraints (5:00)
Legal Groundwork (11:38)
Standards and Methodologies, Part 1 (6:41)
Standards and Methodologies, Part 2 (9:10)
Standards and Methodologies, Part 3 and Threat Modeling Framwworks (3:56)
Environmental and Scoping Considerations (13:31)
Lab Environment Setup (18:52)
Project Strategy and Risk (9:07)
Quiz : Planning and Engagement
Information Gathering and Vulnerability Scanning
Scanning Demo (10:43)
Scanning and Enumeration (3:55)
Packet Investigation (7:44)
Packet Inspection Demo (5:45)
Labtainers Setup (12:05)
Labtainers Lab (Wireshark) (8:52)
Application and Open-Source Resources (10:59)
Prioritize and Prepare Attacks (3:48)
Passive Reconnaissance (9:55)
Active Reconnaissance (7:41)
Additional Eumeration Techniques (2:49)
Vulnerability Scanning (8:31)
Vulnerability Scanning Demo (16:15)
Labtainers Lab (Network Basics) (2:55)
Labtainers Lab (Nmap Discovery) (3:14)
Target Considerations (15:22)
Analyzing Scan Output (6:13)
Nmap Scoping and Output Options (20:55)
Nmap Timing and Performance Options (6:25)
Prioritization of Vulnerabilities (8:54)
Common Attack Techniques (11:58)
Automating Vulnerability Scans (3:32)
Credential Attacks (14:19)
Labtainers Lab (Password Cracking) (2:28)
Labtainers Lab (Secure Socket Layers) (2:34)
Labtainers Lab (Routing Basics) (2:05)
Quiz : Information Gathering and Vulnerability Scanning
Network-Based Attacks
Network-Based Exploits (7:00)
Authentication Attacks (2:53)
FTP Exploit Demo (8:12)
Man-in-the-Middle Exploits (7:00)
Labtainers Lab (TCP/IP Attacks) (2:15)
Labtainers Lab (ARP Spoof Attack) (1:59)
Labtainers Lab (Local DNS Attacks) (1:53)
Labtainers Lab (MACs and Hash Functions) (1:26)
Quiz : Network-Based Attacks
Wireless and RF Attacks
Wireless Exploits, Part 1 (13:10)
Wireless Exploits, Part 2 (2:40)
Quiz : Wireless and RF Attacks
Web and Database Attacks
Application Exploits, Part 1 (5:23)
SQL Injection Demo (8:32)
Labtainers Lab (SQL Injection) (2:39)
Application Exploits, Part 2 (7:57)
Application Exploits, Part 3 (8:56)
Cross-Site Scripting Demo (6:54)
Labtainers Lab (Cross-Site Scripting) (1:42)
Labtainers Lab (Cross-Site Request Forgery) (1:20)
API Attacks and Attack Resources (6:18)
Privilege Escalation (Linux) (9:31)
Privilege Escalation (Windows) (6:01)
Misc. Privilege Escalation (7:50)
Misc. Local Host Vulnerabilities (8:00)
Additional Local Host Vulnerabilities (2:54)
Quiz : Web and Database Attacks
New section
Cloud Attacks, Part 2 (4:34)
Cloud Attacks, Part 1 (4:46)
Quiz : Attacking the Cloud
Specialized and Fragile Systems
Mobile Attacks (10:16)
Virtual and Containerized Environment Attacks (7:21)
Labtainers Lab (Industrial Control System) (1:58)
Quiz : Specialized and Fragile Systems
New section
Remote Social Engineering (5:59)
Pretext for a Social Engineering Attack (2:26)
Spear Phishing Demo (10:02)
In-Person Social Engineering (11:36)
Physical Security (11:09)
Quiz : Social Engineering and Physical Attacks
Post-Exploitation
More Post-Exploitation Techniques (4:18)
Post-Exploitation Techniques (11:04)
Post-Exploitation Tools (3:18)
Network Segmentation Testing (2:47)
Persistence and Stealth (10:36)
Detection Avoidance Techniques (6:08)
More Detection Avoidance Techniques (2:51)
Quiz : Post-Exploitation
Post-Engagement Activities
Report Writing (14:41)
Important Components of Written Reports (2:33)
Mitigation Strategies (4:55)
Technical and Physical Controls (3:43)
Administrative and Operational Controls (5:02)
Communication (8:34)
Presentation of Findings (2:53)
Post-Report Activities (5:18)
Data Destruction Process (1:31)
Quiz : Post-Engagement Activities
Tools and Code Analysis
Bash Scripting Basics (14:50)
Using Scripting in Pen Testing (12:28)
Bash Scripting Techniques (10:03)
PowerShell Scripting Basics (3:59)
Ruby Scripts (6:25)
Python Scripts (5:42)
Scripting Languages Comparison (10:47)
Data Structures, Part 1 (7:33)
Data Structures, Part 2 (8:06)
Libraries (2:53)
Classes (7:57)
Procedures and Functions (5:41)
Perl and Javascript (5:35)
Breach and Attack Simulation (1:46)
Quiz : Tools and Programming
Tools Inventory
Pen Testing Toolbox (6:41)
More Pen Testing Toolbox Tools (3:25)
Using Kali Linux (6:08)
Scanners and Credential Tools (9:43)
Open-Source Research Tools (6:17)
Wireless and Web Pen Testing Tools (10:45)
More Wireless and Web Pen Testing Tools (2:12)
Remote Access Tools (6:11)
Analyzers and Mobile Pen Testing Tools (2:26)
Other Pen Testing Tools (4:12)
Even More Pen Testing Tools (2:36)
Labtainers Lab (Metasploit Framework) (2:06)
Labtainers Lab (Wireshark Packet Inspection) (1:50)
Labtainers Lab (SSH) (1:05)
Scanners, Debuggers, and Wireless Tools (9:41)
More Scanners, Debuggers, and Wireless Tools (2:05)
Web, Steganography, and Cloud Tools (8:58)
Quiz : Tools Inventory
Next Steps & Certification
How to Book Your CompTIA Exam (Voucher Info)
Audio Version of Training
Audio Download
Remote Access Tools
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock