O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam

Video Description

Pass the CompTIA Pentest+ (PT0-001) exam on your 1st attempt, includes a Pentest+ practice exam!

About This Video

  • Take and pass the CompTIA Pentest+ (PT0-001) certification exam
  • Understand the penetration testing methodology
  • Understand how to plan and scope a penetration test

In Detail

The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment, understand the legal/compliance requirements, perform vulnerability scanning/penetration test, and analyze/report on your findings. This certification was released by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA Pentest+ exam is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course).

The CompTIA Pentest+ exam covers FIVE domains:

  • 15%: Planning and Scoping
  • 22%: Information Gathering and Vulnerability Identification
  • 30%: Attacks and Exploits
  • 17%: Penetration Testing Tools
  • 16%: Reporting and Communication.

This course provides everything you need in order to study for the CompTIA Pentest+ exam, including downloadable PDFs of every lecture to follow along with as you progress through the videos and to review before test day. Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Pentest+ exam or to better prepare yourself to serve on your organization's cyber defence team or as an independent penetration tester.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Introduction
    1. Welcome to the course! 00:04:17
    2. Exam Foundations 00:04:12
  2. Chapter 2 : Domain 1: Planning and Scoping
    1. Planning and Scoping (Overview) 00:01:28
    2. Penetration Testing Methodology 00:03:02
    3. Planning a Penetration Test 00:08:08
    4. Rules of Engagement 00:05:39
    5. Legal Concepts 00:11:00
    6. Testing Strategies 00:03:05
    7. White Box Support Resources 00:06:35
    8. Types of Assessments 00:05:48
    9. Threat Actors 00:07:41
    10. Target Selection 00:05:16
    11. Other Scoping Considerations 00:07:10
  3. Chapter 3 : Domain 2: Information Gathering and Vulnerability Identification
    1. Information Gathering and Vulnerability Identification (Overview) 00:02:41
    2. Information Gathering 00:10:12
    3. Reconnaissance with CentralOps (Demo) 00:13:18
    4. Scanning and Enumeration 00:04:30
    5. Fingerprinting 00:04:19
    6. Scanning and Enumeration (Demo) 00:16:00
    7. Cryptographic Inspection 00:01:33
    8. Eavesdropping 00:03:25
    9. Decompiling and Debugging 00:02:53
    10. Open Source Research 00:06:18
    11. Vulnerability Scanning 00:08:52
    12. Scanning Considerations 00:05:41
    13. Application and Container Scans 00:02:57
    14. Analyzing Vulnerability Scans 00:07:12
    15. Leverage Information for Exploit 00:03:23
    16. Common Attack Vectors 00:06:08
    17. Weaknesses in Specialized Systems 00:10:31
  4. Chapter 4 : Domain 3: Attacks and Exploits
    1. Attacks and Exploits (Overview) 00:02:01
    2. Social Engineering 00:12:19
    3. Motivation Factors 00:07:16
    4. Physical Security Attacks 00:05:31
    5. Lock Picking (Demo) 00:01:29
    6. Network-based Vulnerabilities 00:13:47
    7. Wireless-based Vulnerabilities 00:08:45
    8. Wireless Network Attack (Demo) 00:05:53
    9. Application-based Vulnerabilities 00:18:52
    10. Local Host Vulnerabilities 00:03:01
    11. Privilege Escalation (Linux) 00:04:51
    12. Privilege Escalation (Windows) 00:10:44
    13. Privilege Escalation 00:05:11
    14. Privilege Escalation (Demo) 00:04:32
    15. Lateral Movement 00:09:12
    16. Persistence 00:06:50
    17. Covering Your Tracks 00:05:41
    18. Persistence and Covering Tracks (Demo) 00:07:53
  5. Chapter 5 : Domain 4: Penetration Testing Tools
    1. Penetration Testing Tools (Overview) 00:02:49
    2. Nmap Usage 00:10:16
    3. Nmap Usage (Demo) 00:11:55
    4. Use Cases for Tools 00:07:28
    5. Scanners 00:02:08
    6. Credential Testing Tools 00:06:44
    7. Password Cracking (Demo) 00:02:19
    8. Debuggers 00:02:41
    9. Software Assurance 00:02:14
    10. OSINT 00:04:49
    11. Wireless 00:01:49
    12. Web Proxies 00:08:58
    13. Social Engineering Tools 00:01:18
    14. Remote Access Tools 00:07:25
    15. Networking Tools 00:01:35
    16. Mobile Tools 00:02:05
    17. Miscellaneous Tools 00:04:28
    18. Intro to Programming 00:02:58
    19. Programming Concepts 00:21:52
    20. BASH Script Example 00:04:34
    21. Python Script Example 00:03:45
    22. PowerShell Script Example 00:03:28
    23. Ruby Script Example 00:04:28
  6. Chapter 6 : Domain 5: Reporting and Communication
    1. Reporting and Communication (Overview) 00:01:55
    2. Pentest Communications 00:08:42
    3. Report Writing 00:07:59
    4. Mitigation Strategies 00:07:28
    5. Post-Report Activities 00:04:21
    6. Pentest Report Example 00:00:47
  7. Chapter 7 : Conclusion
    1. Conclusion 00:01:56
    2. How to Schedule Your Exam 00:03:33
    3. Creating Your Pentest Lab 00:09:04