CompTIA PenTest+ Cert Guide (PT0-002)
(PT0-002.AB1)
/ ISBN: 978-1-64459-340-0
This course includes
Lessons
TestPrep
LiveLab
Instructor Led (Add-on)
Mentoring (Add-on)
Exam Voucher
Your exam voucher code will be delivered via email within 24 hours of purchase
CompTIA PenTest+ Cert Guide (PT0-002)
Gain hands-on experience to pass the CompTIA Pentest+ certification exam with the CompTIA Pentest+ Cert Guide course and lab. Interactive chapters and hands-on labs comprehensively cover the (PT0-002) exam objectives and provide knowledge in areas such as penetration testing engagement including vulnerability scanning, understanding legal and compliance requirements, analyzing results, and producing a written report with remediation techniques and many more.
Lessons
-
11+ Lessons
-
423+ Exercises
-
117+ Quizzes
-
200+ Flashcards
-
200+ Glossary of terms
TestPrep
-
85+ Pre Assessment Questions
-
2+ Full Length Tests
-
85+ Post Assessment Questions
-
170+ Practice Test Questions
LiveLab
-
43+ LiveLab
-
43+ Video tutorials
-
01:58+ Hours
- The Goals of the CompTIA PenTest+ Certification
- The Exam Objectives (Domains)
- Steps to Earning the PenTest+ Certification
- Facts About the PenTest+ Exam
- About the CompTIA PenTest+ PT0-002 Cert Guide
- Understanding Ethical Hacking and Penetration Testing
- Exploring Penetration Testing Methodologies
- Building Your Own Lab
- Review All Key Topics
- Comparing and Contrasting Governance, Risk, and Compliance Concepts
- Explaining the Importance of Scoping and Organizational or Customer Requirements
- Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
- Review All Key Topics
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Understanding the Art of Performing Vulnerability Scans
- Understanding How to Analyze Vulnerability Scan Results
- Review All Key Topics
- Pretexting for an Approach and Impersonation
- Social Engineering Attacks
- Physical Attacks
- Social Engineering Tools
- Methods of Influence
- Review All Key Topics
- Exploiting Network-Based Vulnerabilities
- Exploiting Wireless Vulnerabilities
- Review All Key Topics
- Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
- How to Build Your Own Web Application Lab
- Understanding Business Logic Flaws
- Understanding Injection-Based Vulnerabilities
- Exploiting Authentication-Based Vulnerabilities
- Exploiting Authorization-Based Vulnerabilities
- Understanding Cross-Site Scripting (XSS) Vulnerabilities
- Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
- Understanding Clickjacking
- Exploiting Security Misconfigurations
- Exploiting File Inclusion Vulnerabilities
- Exploiting Insecure Code Practices
- Review All Key Topics
- Researching Attack Vectors and Performing Attacks on Cloud Technologies
- Explaining Common Attacks and Vulnerabilities Against Specialized Systems
- Review All Key Topics
- Creating a Foothold and Maintaining Persistence After Compromising a System
- Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
- Review All Key Topics
- Comparing and Contrasting Important Components of Written Reports
- Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
- Explaining the Importance of Communication During the Penetration Testing Process
- Explaining Post-Report Delivery Activities
- Review All Key Topics
- Understanding the Basic Concepts of Scripting and Software Development
- Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
- Review All Key Topics
Hands on Activities (Live Labs)
- Performing Zone Transfer Using dig
- Using dnsrecon
- Using Recon-ng to Gather Information
- Performing Reconnaissance on a Network
- Performing Nmap UDP Scan
- Using Nmap for User Enumeration
- Using Nmap for Network Enumeration
- Performing Nmap SYN Scan
- Conducting Vulnerability Scanning Using Nessus
- Using BeEF
- Using the SET Tool
- Using the EternalBlue Exploit in Metasploit
- Simulating the DDoS Attack
- Performing a DHCP Starvation Attack
- Understanding the Pass-the-hash Attack
- Performing ARP Spoofing
- Exploiting SMTP
- Exploiting SNMP
- Searching Exploits Using searchsploit
- Exploiting SMB
- Exploiting Command Injection Vulnerabilities
- Exploiting a Website Using SQL Injection
- Performing Session Hijacking Using Burp Suite
- Cracking Passwords
- Conducting a Cross-Site Request Forgery Attack
- Understanding Local Privilege Escalation
- Using OWASP ZAP
- Using the Task Scheduler
- Writing Bash Shell Script
- Performing an Intense Scan in Zenmap
- Using dig and nslookup Commands
- Creating Reverse and Bind Shells Using Netcat
- Hiding Text Using Steganography
- Using the Metasploit RDP Post-Exploitation Module
- Finding Live Hosts by Using the Ping Sweep in Python
- Whitelisting an IP Address in the Windows Firewall
- Viewing Exploits Written in Perl
- Viewing the Effects of Hostile JavaScript in the Browser
- Using Meterpreter
- Performing Vulnerability Scanning Using OpenVAS
- Enumerating Data Using enum4linux
- Using Maltego to Gather Information
- Cracking a Linux Password Using John the Ripper
×