CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam

Video description

Your perfect companion to prepare and ace the CompTIA Pentest+ (PT0-001) exam

About This Video

  • Learn ethical hacking from an examination point of view
  • Understand the penetration testing methodology
  • Plan and scope a penetration test

In Detail

The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment and analyze/report on your findings. This certification was released by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field).

This course is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course). This course provides everything you need in order to study for the CompTIA Pentest+ exam. Each section is dedicated to each of the 5 domains, and each domain contains brief videos on topics that will further your understanding of ethical hacking and get you one step closer to ace the exam.

By the end of the course, you will have the confidence to tackle the CompTIA Pentest+ exam and become a certified ethical hacker. You will also create your own pentest lab.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Introduction
    1. Welcome to the Course!
    2. Exam Foundations
  2. Chapter 2 : Domain 1: Planning and Scoping
    1. Planning and Scoping (Overview)
    2. Penetration Testing Methodology
    3. Planning a Penetration Test
    4. Rules of Engagement
    5. Legal Concepts
    6. Testing Strategies
    7. White Box Support Resources
    8. Types of Assessments
    9. Threat Actors
    10. Target Selection
    11. Other Scoping Considerations
  3. Chapter 3 : Domain 2: Information Gathering and Vulnerability Identification
    1. Information Gathering and Vulnerability Identification (Overview)
    2. Information Gathering
    3. Reconnaissance with CentralOps (Demo)
    4. Scanning and Enumeration
    5. Fingerprinting
    6. Scanning and Enumeration (Demo)
    7. Cryptographic Inspection
    8. Eavesdropping
    9. Decompiling and Debugging
    10. Open Source Research
    11. Vulnerability Scanning
    12. Scanning Considerations
    13. Application and Container Scans
    14. Analyzing Vulnerability Scans
    15. Leverage Information for Exploit
    16. Common Attack Vectors
    17. Weaknesses in Specialized Systems
  4. Chapter 4 : Domain 3: Attacks and Exploits
    1. Attacks and Exploits (Overview)
    2. Social Engineering
    3. Motivation Factors
    4. Physical Security Attacks
    5. Lock Picking (Demo)
    6. Network-Based Vulnerabilities
    7. Wireless-Based Vulnerabilities
    8. Wireless Network Attack (Demo)
    9. Application-Based Vulnerabilities
    10. Local Host Vulnerabilities
    11. Privilege Escalation (Linux)
    12. Privilege Escalation (Windows)
    13. Privilege Escalation
    14. Privilege Escalation (Demo)
    15. Lateral Movement
    16. Persistence
    17. Covering Your Tracks
    18. Persistence and Covering Tracks (Demo)
  5. Chapter 5 : Domain 4: Penetration Testing Tools
    1. Penetration Testing Tools (Overview)
    2. Nmap Usage
    3. Nmap Usage (Demo)
    4. Use Cases for Tools
    5. Scanners
    6. Credential Testing Tools
    7. Password Cracking (Demo)
    8. Debuggers
    9. Software Assurance
    10. OSINT
    11. Wireless
    12. Web Proxies
    13. Social Engineering Tools
    14. Remote Access Tools
    15. Networking Tools
    16. Mobile Tools
    17. Miscellaneous Tools
    18. Introduction to Programming
    19. Programming Concepts
    20. BASH Script Example
    21. Python Script Example
    22. PowerShell Script Example
    23. Ruby Script Example
  6. Chapter 6 : Domain 5: Reporting and Communication
    1. Reporting and Communication (Overview)
    2. Pentest Communications
    3. Report Writing
    4. Mitigation Strategies
    5. Post-Report Activities
    6. Pentest Report Example
  7. Chapter 7 : Conclusion
    1. Conclusion
    2. Creating Your Pentest Lab

Product information

  • Title: CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
  • Author(s): Jason Dion
  • Release date: March 2019
  • Publisher(s): Packt Publishing
  • ISBN: 9781838824105