Description
Price: 6.00 USD | Size: 1.0 GB | Duration : 7.17 Hours | 62 Video Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
CompTIA PenTest+ Course
“Advanced CompTIA PenTest+ Certification Training Course”
1. Introduction to PenTest+
1. Welcome to the Course
2. Exam Foundations
2. Planning for an Engagement
1. Planning and Scoping Introduction
2. Penetration Testing Methodology
3. Planning a Penetration Test
4. Rules of Engagement
5. Legal Concepts
3. Scoping an Engagement
1. Testing Strategies
2. White Box Support Resources
3. Types of Assessments
4. Threat Actors
5. Target Selection
6. Whitelisting and Other Scoping Considerations
4. Information Gathering
1. Introduction to Information Gathering and Vulnerability Identification
10. Open Source Intelligence
2. Information Gathering Techniques
3. Information Gathering Techniques Demonstration
4. Scanning and Enumeration
5. Scanning and Enumeration Demonstration
6. Fingerprinting
7. Cryptographic Inspection
8. Eavesdropping
9. Decompiling and Debugging
5. Vulnerability Scanning
1.Vulnerability Scanning
2. Scanning Considerations
3. Application and Container Scans
4. Analyzing Vulnerability Scans
6. Preparing for Exploitation
1. Leveraging Information for Exploit
2. Common Attack Techniques
3. Weaknesses in Specialized Systems
7. Social Engineering and Physical Attacks
1. Attacks and Exploits Overview
2. Social Engineering Attack Methods
3. Social Engineering Motivation Factors
4. Physical Security Attacks
btl1-syllabus-v2-2
8. Exploiting Network and Application Vulnerabilites
1. Network-based Vulnerabilities
2. Wireless-based Vulnerabilities
3. Wireless Network Attack Demonstration
4. Application-based Vulnerabilities
9. Exploiting host-based vulnerabilities
1. Local Host Vulnerabilities
2. Privilege Escalation (Linux)
3. Privilege Escalation (Windows)
4. Privilege Escalation Techniques
5. Privilege Escalation Demo
10. Post-exploitation Activites
1. Lateral Movement
2. Persistence
3. Covering Your Tracks
4. Persistence and Covering Tracks Demonstration
11. Using NMAP for Pentesting
1. Pentesting Tools Introduction
2. Nmap Usage
3. Nmap Demonstration
12. Use Cases of Pentesting Tools
1. Pentesting Tools Introduction
2. Nmap Usage
3 .Nmap Demonstration
13. Basic Script Analysis
1. Introduction to Programming
2. Programming Concepts
3. BASH Sample Script
4. Python Sample Script
5. PowerShell Sample Script
6. Ruby Sample Script
14. Reporting and Communication
1. Introduction to Reporting and Communication
2. Pentest Communications
3. Report Writing
4. Mitigation Strategies
5. Post-report Activities
15. PenTest+ Conclusion
1. Conclusion
2. Creating Your Pentest Lab
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.