O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-001)

Video Description

From Mike Meyers and Total Seminars: Michael Solomon on ethical hacking and high-level penetration testing. Hack like a pro

About This Video

  • There are no requirements for taking this course, nor for sitting the CompTIA PenTest+ exam; however, a basic familiarity with networks and network security is recommended
  • Familiarity with information in the CompTIA Network+ and Security+ exams is recommended
  • Although this course is a CompTIA PenTest+ exam prep, it's also designed for a broader audience, so those without much network security knowledge can still gain valuable information on pen testing and ethical hacking

In Detail

Mike Meyers and the Total Seminars Team, your source for best-selling cybersecurity courses, brings you this ethical hacking and penetration testing course with your instructor Michael Solomon, Ph.D., CISSP, PMP, CISM. We've added two bonus practice tests. One practice test covers the EC-Council Certified Ethical Hacker CEH certification exam; the other practice test covers the CompTIA PenTest+ certification exam. Test your readiness to pass either of these industry ethical-hacking certification exams. With 30+ years' experience in security, privacy, Blockchain, and data science, and an energetic presentation style, Michael takes his proficiency in network penetration testing and consolidates it into this informative and engaging course. Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you're in the right place. Keep in mind that there's much more to being an ethical hacker than what's covered here, including how to secure a network; however, this course focuses on how to be a pentester. A pentester plans and scopes a pentest engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.
This course shows you how to:

  • Use the tools you'll need to scan networks, crack passwords, analyze and intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, and suggest solutions to the client to remediate these weak points
  • Practice your pen testing skills within a virtual environment, including using Oracle VM manager, Kali Linux, Metasploitable, and DVWA
  • Scope, plan and execute a pentest engagement from start to finish

All the code and supporting files for this course are available at: https://github.com/PacktPublishing/-Ethical-Hacking-and-CompTIA-PenTest-Exam-Prep-PT0-001-

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Introduction
    1. Introduction 00:08:40
  2. Chapter 2 : Planning and Scoping
    1. Planning a Pen Test 00:08:55
    2. Rules of Engagement 00:10:42
    3. Resources and Budget 00:07:21
    4. Impact and Constraints 00:05:18
    5. Support Resources 00:13:26
    6. Legal Groundwork 00:11:58
    7. Scope Considerations 00:10:51
    8. Lab Environment Setup 00:23:53
    9. Project Strategy and Risk 00:09:24
    10. Scope Vulnerabilities 00:13:33
    11. Compliance-Based Assessments 00:05:25
  3. Chapter 3 : Surveying the Target
    1. Scanning and Enumeration 00:04:36
    2. Scanning Demo 00:10:59
    3. Packet Investigation 00:08:03
    4. Packet Inspection Demo 00:06:02
    5. Application and Open-Source Resources 00:11:52
    6. Vulnerability Scanning 00:08:51
    7. Vulnerability Scanning Demo 00:16:32
    8. Target Considerations 00:15:40
    9. Nmap Timing and Performance Options 00:06:43
    10. Prioritization of Vulnerabilities 00:09:18
    11. Common Attack Techniques 00:12:17
    12. Credential Attacks 00:14:42
    13. Weaknesses in Specialized Systems 00:18:08
  4. Chapter 4 : Selection Your Attack Vector
    1. Remote Social Engineering 00:06:51
    2. Spear Phishing Demo 00:10:19
    3. In-Person Social Engineering 00:12:00
    4. Network-Based Exploits 00:07:20
    5. FTP Exploit Demo 00:08:28
    6. Man-in-the-middle Exploits 00:07:19
    7. Wireless Exploits 00:13:30
    8. Application Exploits, Part 1 00:05:41
    9. SQL Injection Demo 00:08:49
    10. Application Exploits, Part 2 00:08:15
    11. Application Exploits, Part 3 00:09:15
    12. Cross-Site Scripting Demo 00:07:11
    13. Code Vulnerabilities 00:16:49
    14. Local Host Vulnerabilities 00:05:09
    15. Privilege Escalation (Linux) 00:09:50
    16. Privilege Escalation (Windows) 00:06:18
    17. Misc. Privilege Escalation 00:08:07
    18. Misc. Local Host Vulnerabilities 00:08:18
    19. Physical Security 00:11:27
    20. Post-Exploitation Techniques 00:11:23
    21. Persistence and Stealth 00:10:56
  5. Chapter 5 : Selecting Pen Testing Tools
    1. Nmap Scoping & Output Options 00:21:15
    2. Pen Testing Toolbox 00:06:59
    3. Using Kali Linux 00:06:27
    4. Scanners & Credential Tools 00:10:23
    5. Code Cracking Tools 00:04:36
    6. Open Source Research Tools 00:06:36
    7. Wireless and Web Pen Testing Tools 00:11:03
    8. Remote Access Tools 00:06:28
    9. Analyzers and Mobile Pen Testing Tools 00:02:44
    10. Other Pen Testing Tools 00:04:37
    11. Using Scripting in Pen Testing 00:12:46
    12. Bash Scripting Basics 00:15:10
    13. Bash Scripting Techniques 00:10:21
    14. PowerShell Scripts 00:04:16
    15. Ruby Scripts 00:06:44
    16. Python Scripts 00:06:00
    17. Scripting Languages, comparison 00:11:06
  6. Chapter 6 : Reporting and Communication
    1. Writing Reports 00:16:02
    2. Post Report Activities 00:05:37
    3. Mitigation Strategies 00:05:13
    4. Communication 00:09:55