Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
Offered By: Pluralsight
Course Description
Overview
In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.
If you're preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.
If you're preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.
Syllabus
- Course Overview 1min
- Attacks Against Cloud Technologies 30mins
- Attacking and Exploiting Specialized Systems 44mins
- Social Engineering and Physical Attacks 31mins
- Post-exploitation 45mins
- Domain Summary 5mins
Taught by
Matthew Lloyd Davies
Related Courses
CompTIA Security+ Course CertificationCybrary CompTIA Security+ Certification Training - SY0-601
Edureka Become a CompTIA Advanced Security Practitioner (CASP+)
LinkedIn Learning Become a CompTIA Certified Penetration Tester (PenTest+)
LinkedIn Learning Become a CompTIA Cybersecurity Analyst (CySA+ CS0-002)
LinkedIn Learning