O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Pentest+ Certification

Video Description

Master the most up-to-date penetration testing and management skills to determine resiliency against cyber-attacks

About This Video

  • Extensive exercises and practice sessions to understand real-world security issues.
  • Robust pentesting training to troubleshoot and solve system risks.
  • Intensive topics to help you pass the CompTIA Pentest+ PT0-001 exam

In Detail

The CompTIA Pentest+ certification PT0-001 is an intermediate-level certification. It is unique because this certification requires the candidate to demonstrate the required hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. The course will help you move step-by-step into the pentesting world. You’ll learn the basics of pentesting. You will be skilled enough to plan and scope an assessment, understand legal and compliance requirements, and perform vulnerability scanning. By the end of the course, you’ll be able to analyze data, effectively generate reports, and communicate results. Packed with crucial practice questions, this course will help you ace the world-famous CompTIA Pentest+ Certification.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Course Introduction
    1. The Course Overview 00:01:43
    2. CompTIA Pentest+ (PT0-001) Certification Information 00:05:03
    3. How to Get the Most Out of This Course? 00:01:32
    4. Advantages of CompTIA Pentest+ Certification 00:02:28
    5. Lab Setup – Virtual Machine Installation 00:06:18
    6. Download Windows and Kali Linux 00:07:41
    7. Installation of Windows and Kali Linux 00:05:33
  2. Chapter 2 : Let’s Prepare for Pentesting
    1. Planning and Scoping Overview 00:03:10
    2. Penetration Testing Methodology 00:04:14
    3. Planning a Penetration Test 00:03:53
    4. Resources and Budgets 00:04:05
    5. Impacts and Constraints 00:03:14
    6. Rules of Engagement 00:03:35
    7. Penetration Testing Strategies 00:03:56
    8. Types of Assessments 00:04:00
    9. Threat Actors 00:03:23
    10. Penetration Testing Terminologies 00:04:17
    11. Legal Information 00:03:20
  3. Chapter 3 : Information Gathering
    1. Information Gathering Basics 00:01:51
    2. Discover Active Machines in the Network 00:08:00
    3. Discover Open Ports in the Network Using Nmap 00:06:56
    4. Various Nmap Commands 00:13:11
    5. Discover Website Frontend and Backend Information 00:05:22
    6. Discover Subdomains of a Website 00:08:44
    7. Download Website Folders Offline 00:09:00
    8. Discover Social Networking Accounts Associated with a Person 00:09:07
    9. Discover Emails of the Target’s Friends 00:07:22
    10. Discover Relations between Organizations 00:04:14
  4. Chapter 4 : Vulnerability Identification
    1. Vulnerability Assessment Basics 00:01:38
    2. Nessus – Network Vulnerability Scanner Installation 00:10:16
    3. Network Scanning and Report Generation 00:11:13
    4. Acunetix – Web Vulnerability Scanner Installation 00:10:07
    5. Website Scanning and Report Generation 00:10:39
    6. OWASP ZAP Web Vulnerability Scanner 00:11:17
    7. Burp Suite Web Analyzer 00:11:09
    8. WPScan WordPress Analyzer 00:06:07
  5. Chapter 5 : Penetration Testing Tools
    1. Penetration Testing Tools Overview 00:01:37
    2. Database Attack Tools 00:12:45
    3. Password Attack Tools 00:11:47
    4. Wireless Attack Tools 00:11:07
    5. Social Engineering Tools 00:13:52
    6. Sniffing Tools 00:12:39
    7. Exploitation Tools 00:07:57
    8. Post Exploitation Tools 00:03:26
  6. Chapter 6 : Attacks and Exploits
    1. Attacks and Exploits Overview 00:02:27
    2. Database Attack Using sqlmap Tool 00:15:56
    3. Database Attack Using jSQL Tool 00:07:31
    4. Password Attack Using Hydra Tool 00:10:00
    5. Password Attack Using Medusa Tool 00:04:48
    6. Exploitation Attack Using Metasploit Framework 00:10:34
    7. Exploitation Attack Using BeEF Framework 00:14:50
    8. Wireless Exploitation Setup 00:07:50
    9. Wireless Attack Using Fern Wi-Fi Cracker 00:09:28
    10. Shell and Python Scripts 00:07:11
    11. AV Bypass Using Shell and Python Scripts 00:10:28
  7. Chapter 7 : Reporting and Communication
    1. Reporting and Communication Overview 00:02:34
    2. Report Writing Steps 00:02:13
    3. Metagoofil – Reporting Tool 00:08:30
    4. MagicTree – Reporting Tool 00:09:18
    5. Recordmydesktop – Reporting Tool 00:05:39
    6. Report Summary 00:02:56
  8. Chapter 8 : CompTIA Pentest+ Exam Practice Questions
    1. Pentest+ Exam Practice Questions – Part 1 00:05:48
    2. Pentest+ Exam Practice Questions – Part 2 00:06:43
    3. Pentest+ Exam Practice Questions – Part 3 00:07:48
    4. Pentest+ Exam Practice Questions – Part 4 00:07:27
    5. Pentest+ Exam Practice Questions – Part 5 00:07:59
    6. Course Summary 00:01:26