Autoplay
Autocomplete
Previous Lesson
Complete and Continue
TOTAL: CompTIA PenTest+ (PT0-002)
Introduction to Ethical Hacking & CompTIA PenTest+ (PT0-002)
Introduction to the CompTIA PenTest+ (PT0-002) Course (2:09)
About the CompTIA PenTest+ (PT0-002) Exam (7:21)
Planning and Engagement
Planning a Pen Test (8:21)
Rules of Engagement (10:28)
Regulatory Compliance (4:23)
Resources and Budgets (7:07)
Impact and Constraints (5:06)
Support Resources (13:14)
Legal Groundwork (11:43)
Service Provider Agreements (2:12)
Standards and Methodologies, Part 1 (6:48)
Standards and Methodologies, Part 2 (9:17)
Environmental and Scoping Considerations (13:38)
Ethical Mindset (5:36)
Lab Environment Setup (17:32)
Project Strategy and Risk (9:12)
Scope Vulnerabilities (13:19)
Compliance-Based Assessments (4:08)
Chapter 1 Quiz
Information Gathering and Vulnerability Scanning
Scanning and Enumeration (4:16)
Scanning and Demo (10:46)
Packet Investigation (7:57)
Packet Inspection Demo (5:48)
Labtainers Setup (12:09)
Labtainers Lab (Wireshark) (8:54)
Application and Open-Source Resources (11:38)
Passive Reconnaissance (10:07)
Active Reconnaissance (7:50)
Vulnerability Scanning (8:41)
Vulnerability Scanning Demo (16:20)
Labtainers Lab (Network Basics) (2:50)
Labtainers Lab (Nmap Discovery) (3:12)
Target Considerations (15:36)
Analyzing Scan Output (5:01)
Nmap Scoping and Output Options (21:04)
Nmap Timing and Performance Options (6:31)
Prioritization of Vulnerabilities (9:07)
Common Attack Techniques (12:05)
Automating Vulnerability Scans (3:35)
Credential Attacks (14:31)
Labtainers Lab (Password Cracking) (2:23)
Labtainers Lab (Secure Socket Layers) (2:30)
Labtainers Lab (Routing Basics) (1:59)
Chapter 2 Quiz
Network-Based Attacks
Exploit Resources and Network Attacks (4:37)
Network-Based Exploits (7:07)
FTP Exploit Demo (8:14)
Man-in-the-Middle Exploits (7:06)
Labtainers Lab (TCP/IP Attacks) (2:09)
Labtainers Lab (ARP Spoof Attack) (1:53)
Labtainers Lab (Local DNS Attacks) (1:47)
Labtainers Lab (MACs and Hash Functions) (1:19)
Chapter 3 Quiz
Wireless and RF Attacks
Wireless Exploits (13:17)
Wireless Exploits, Part 2 (2:46)
Antennas (3:48)
Chapter 4 Quiz
Reporting and Communication
OWASP Top 10 (8:40)
Application Exploits, Part 1 (5:34)
SQL Injection Demo (8:41)
Labtainers Lab (SQL Injection) (2:38)
Application Exploits, Part 2 (8:02)
Application Exploits, Part 3 (9:11)
Cross-Site Scripting Demo (7:00)
Labtainers Lab (Cross-Site Scripting) (1:36)
Labtainers Lab (Cross-Site Request Forgery) (1:14)
Code Vulnerabilities (16:36)
API Attacks and Attack Resources (6:28)
Privilege Escalation (Linux) (9:37)
Privilege Escalation (Windows) (6:09)
Misc. Privilege Escalation (7:54)
Misc. Local Host Vulnerabilities (8:05)
Chapter 5 Quiz
Attacking the Cloud
Cloud Attacks, Part 1 (4:50)
Cloud Attacks, Part 2 (4:39)
Chapter 6 Quiz
Specialized and Fragile Systems
Mobile Attacks (10:25)
IoT Attacks (10:18)
Data Storage and Management Interface Attacks (8:58)
Virtual and Containerized Environment Attacks (7:31)
Labtainers Lab (Industrial Control System) (1:51)
Chapter 7 Quiz
Social Engineering and Physical Attacks
Pretext for a Social Engineering Attack (2:31)
Remote Social Engineering (6:10)
Spear Phishing Demo (10:09)
In-Person Social Engineering (11:45)
Physical Security (11:17)
Chapter 8 Quiz
Post-Exploitation
Post-Exploitation Techniques (11:07)
Post-Exploitation Tools (3:22)
Network Segmentation Testing (3:00)
Persistence and Stealth (10:45)
Detection Avoidance Techniques (6:16)
Chapter 9 Quiz
Post-Engagement Activities
Report Writing (14:47)
Important Components of Written Reports (2:37)
Mitigation Strategies (5:00)
Technical and Physical Controls (3:46)
Administrative and Operational Controls (5:10)
Communication (8:38)
Presentation of Findings (2:57)
Post-Report Activities (5:23)
Data Destruction Process (1:37)
Chapter 10 Quiz
Tools and Programming
Using Scripting in Pen Testing (12:32)
Bash Scripting Basics (14:55)
Bash Scripting Techniques (10:11)
PowerShell Scripts (4:02)
Ruby Scripts (6:32)
Python Scripts (5:45)
Scripting Languages Comparison (10:56)
Data Structures, Part 1 (7:41)
Data Structures, Part 2 (8:12)
Libraries (3:03)
Classes (8:05)
Procedures and Functions (5:48)
Perl and Javascript (5:41)
Chapter 11 Quiz
Tools Inventory
Pen Testing Toolbox (6:46)
Using Kali Linux (6:14)
Scanners and Credential Tools (9:52)
Code Cracking Tools (4:20)
Open Source Research Tools (6:21)
Wireless and Web Pen Testing Tools (10:48)
Remote Access Tools (6:15)
Analyzers and Mobile Pen Testing Tools (2:29)
Other Pen Testing Tools (4:19)
Labtainers Lab (Metasploit Framework) (2:00)
Labtainers Lab (Wireshark Packet Inspection) (1:44)
Labtainers Lab (SSH) (0:58)
Scanners, Debuggers, and Wireless Tools (9:51)
Web, Steganography, and Cloud Tools (9:08)
Chapter 12 Quiz
Passive Reconnaissance
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock