YoVDO

CompTIA PenTest+ Full Course - PT0-002

Offered By: Paul Browning via YouTube

Tags

Penetration Testing Courses Cybersecurity Courses Network Security Courses Social Engineering Courses Information Gathering Courses Vulnerability Scanning Courses

Course Description

Overview

Embark on a comprehensive 11-hour journey through the world of penetration testing with this in-depth CompTIA PenTest+ course. Gain both theoretical knowledge and hands-on experience through follow-along labs covering essential topics such as planning and scoping, information gathering, vulnerability scanning and analysis, various exploit types, network and application exploitation, social engineering, and scripting. Master tools like Metasploit Framework, passive information gathering tools, and vulnerability scan tools. Explore crucial concepts including legal considerations, wireless exploits, and kernel exploitation in both Windows and Linux environments. Develop practical skills in scripting with Bash, PowerShell, Python, and Ruby. Conclude with insights on effective reporting and monitoring practices, preparing you thoroughly for the CompTIA PenTest+ PT0-002 exam and real-world penetration testing scenarios.

Syllabus

- The CompTIA Pentest+ Exam
- Pentesting
- Explain the Importance of Planning for an Engagement.
- Explain Key Legal Concepts
- Passive Information Gathering, Reconnaissance and Enumeration
- Passive Information Gathering Tools
- Reconnaissance Tools
- Vulnerability Management
- Vulnerability Scan Tools
- Interpreting Vulnerabilities Reports
- Exploit Types
- Metasploitable and Exploits DBs
- The Metasploit Framework
- Network Exploits
- NetBIOS Exploits
- Wireless Exploits
- Some Network Exploitation Tools
- Social Engineering
- Social Engineering Toolkit
- Exploiting Applications
- Injection Tools
- Special Permission Bits in Linux
- Exploiting Windows Hashes and Kernel
- Exploiting Linux Kernels
- Scripting in Bash, Powershell, Python and Ruby
- Reporting and Monitoring


Taught by

Paul Browning

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent