CompTIA PenTest+ (PT0-002) Cert Prep
Offered By: LinkedIn Learning
Course Description
Overview
Practice your skills and get ready to tackle the CompTIA PenTest+ (PT0-002) certification exam.
Syllabus
Introduction to Ethical Hacking and CompTIA PenTest+ (PTO-002)
- Introduction to CompTIA PenTest+ (PT0-002)
- About the CompTIA PenTest+ (PT0-002) exam
- Planning a pen test
- Rules of engagement
- Regulatory compliance
- Resources and budgets
- Impact and constraints
- Support resources
- Legal groundwork
- Service provider agreements
- Standards and methodologies, part 1
- Standards and methodologies, part 2
- Environmental and scoping considerations
- Ethical mindset
- Lab environment setup
- Project strategy and risk
- Scope vulnerabilities
- Compliance-based assessments
- Scanning and enumeration
- Scanning and demo
- Packet investigation
- Packet inspection demo
- Labtainers setup
- Labtainers lab: Wireshark
- Application and open-source resources
- Passive reconnaissance
- Active reconnaissance
- Vulnerability scanning
- Vulnerability scanning demo
- Labtainers lab: Network basics
- Labtainers lab: Nmap discovery
- Target considerations
- Analyzing scan output
- Nmap scoping and output options
- Nmap timing and performance options
- Prioritization of vulnerabilities
- Common attack techniques
- Automating vulnerability scans
- Credential attacks
- Labtainers lab: Password cracking
- Labtainers lab: Secure Sockets Layer
- Labtainers lab: Routing basics
- Exploit resources and network attacks
- Network-based exploits
- FTP exploit demo
- Man-in-the-middle exploits
- Labtainers lab: TCP/IP attacks
- Labtainers lab: ARP spoof attack
- Labtainers lab: Local DNS attacks
- Labtainers lab: MACs and hash functions
- Wireless exploits, part 1
- Wireless exploits, part 2
- Antennas
- OWASP Top 10
- Application exploits, part 1
- SQL injection demo
- Labtainers lab: SQL injection
- Application exploits, part 2
- Application exploits, part 3
- Cross-site scripting demo
- Labtainers lab: Cross-site scripting
- Labtainers lab: Cross-site request forgery
- Code vulnerabilities
- API attacks and attack resources
- Privilege escalation: Linux
- Privilege escalation: Windows
- Miscellaneous privilege escalation
- Miscellaneous local host vulnerabilities
- Cloud attacks, part 1
- Cloud attacks, part 2
- Mobile attacks
- IoT attacks
- Data storage and management interface attacks
- Virtual and containerized environment attacks
- Labtainers lab: Industrial control system
- Pretext for a social engineering attack
- Remote social engineering
- Spear phishing demo
- In-person social engineering
- Physical security
- Post-exploitation techniques
- Post-exploitation tools
- Network segmentation testing
- Persistence and stealth
- Detection avoidance techniques
- Report writing
- Important components of written reports
- Mitigation strategies
- Technical and physical controls
- Administrative and operational controls
- Communication
- Presentation of findings
- Post-report activities
- Data destruction process
- Using scripting in pen testing
- Bash scripting basics
- Bash scripting techniques
- PowerShell scripts
- Ruby scripts
- Python scripts
- Scripting languages comparison
- Data structures, part 1
- Data structures, part 2
- Libraries
- Classes
- Procedures and functions
- Perl and JavaScript
- Pen testing toolbox
- Using Kali Linux
- Scanners and credential tools
- Code-cracking tools
- Open-source research tools
- Wireless and web pen testing tools
- Remote access tools
- Analyzers and mobile pen testing tools
- Other pen testing tools
- Labtainers lab: Metasploit framework
- Labtainers lab: Wireshark packet inspection
- Labtainers lab: SSH
Taught by
Michael Solomon and Total Seminars
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera