Sale!

CompTIA PenTest+ Course

Original price was: $25.00.Current price is: $6.00.

Price: 6.00 USD | Size: 1.0 GB  

Duration : 7.17 Hours | 62 Video Lessons

BRAND: 

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 6.00 USD | Size: 1.0 GB |   Duration : 7.17 Hours | 62 Video Lessons |

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

 

CompTIA PenTest+ Course

“Advanced CompTIA PenTest+ Certification Training Course”

 

1. Introduction to PenTest+
1. Welcome to the Course

2. Exam Foundations
2. Planning for an Engagement
1. Planning and Scoping Introduction
2. Penetration Testing Methodology
3. Planning a Penetration Test
4. Rules of Engagement
5. Legal Concepts

3. Scoping an Engagement
1. Testing Strategies
2. White Box Support Resources
3. Types of Assessments
4. Threat Actors
5. Target Selection
6. Whitelisting and Other Scoping Considerations

4. Information Gathering
1. Introduction to Information Gathering and Vulnerability Identification
10. Open Source Intelligence
2. Information Gathering Techniques
3. Information Gathering Techniques Demonstration
4. Scanning and Enumeration
5. Scanning and Enumeration Demonstration
6. Fingerprinting
7. Cryptographic Inspection
8. Eavesdropping
9. Decompiling and Debugging

5. Vulnerability Scanning
1.Vulnerability Scanning
2. Scanning Considerations
3. Application and Container Scans
4. Analyzing Vulnerability Scans

6. Preparing for Exploitation
1. Leveraging Information for Exploit
2. Common Attack Techniques
3. Weaknesses in Specialized Systems

7. Social Engineering and Physical Attacks
1. Attacks and Exploits Overview
2. Social Engineering Attack Methods
3. Social Engineering Motivation Factors
4. Physical Security Attacks
btl1-syllabus-v2-2

8. Exploiting Network and Application Vulnerabilites
1. Network-based Vulnerabilities
2. Wireless-based Vulnerabilities
3. Wireless Network Attack Demonstration
4. Application-based Vulnerabilities

9. Exploiting host-based vulnerabilities
1. Local Host Vulnerabilities
2. Privilege Escalation (Linux)
3. Privilege Escalation (Windows)
4. Privilege Escalation Techniques
5. Privilege Escalation Demo

10. Post-exploitation Activites
1. Lateral Movement
2. Persistence
3. Covering Your Tracks
4. Persistence and Covering Tracks Demonstration

11. Using NMAP for Pentesting
1. Pentesting Tools Introduction
2. Nmap Usage
3. Nmap Demonstration

12. Use Cases of Pentesting Tools
1. Pentesting Tools Introduction
2. Nmap Usage
3 .Nmap Demonstration

13. Basic Script Analysis
1. Introduction to Programming
2. Programming Concepts
3. BASH Sample Script
4. Python Sample Script
5. PowerShell Sample Script
6. Ruby Sample Script

14. Reporting and Communication
1. Introduction to Reporting and Communication
2. Pentest Communications
3. Report Writing
4. Mitigation Strategies
5. Post-report Activities

15. PenTest+ Conclusion
1. Conclusion
2. Creating Your Pentest Lab


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

You may also like…