You are here

CompTIA PenTest+ (PT0-001)

E-COURSE:

CompTIA PenTest+ (PT0-001)

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings. Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security. CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

Instructor: Chrys Thorsen

Objectives
  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results
Prerequisites

Although not a prerequisite the CompTIA PenTest+ (PT0-001) Certification is aimed at an IT security professional who has:

  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience
Target Audience

This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management

  1. PLANNING AND SCOPING
1
Start
Overview
2
Start
Planning an Engagement
3
Start
Planning on Engagement Part 2
4
Start
Planning an Engagement Part 3
5
Start
Planning an Engagement Part 4
6
Start
Legal Concepts
7
Start
Scoping an Engagement
8
Start
Scoping an Engagement Part 2
9
Start
Compliance-Based Assessments
  1. INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
10
Start
Pentesting Tools: Use Cases
11
Start
Pentesting Tools: Use Cases Part 2
12
Start
Pentesting Tools: Scanners
13
Start
Pentesting Tools: Credential Testing
14
Start
Pentesting Tools: Credential Testing Part 2
15
Start
Pentesting Tools: Web Directory Enum
16
Start
Pentesting Tools: Debuggers
17
Start
Pentesting Tools: OSINT
18
Start
Pentesting Tools: Wireless
19
Start
Pentesting Tools: Web Proxies
20
Start
Pentesting Tools: Social Engineering
21
Start
Pentesting Tools: Remote Access
22
Start
Pentesting Tools: Networking
23
Start
Pentesting Tools: Misc
24
Start
Pentesting Tools: Mobile
25
Start
Nmap
26
Start
Common Pentest Objectives
27
Start
Analyze Scripts: Bash
28
Start
Analyze Scripts: Bash Part 2
29
Start
Analyze Scripts: Bash Part 3
30
Start
Analyze Scripts: Python
31
Start
Analyze Scripts: Python Part 2
32
Start
Analyze Scripts: Python Part 3
33
Start
Analyze Scripts: Ruby
34
Start
Analyze Scripts: Ruby Part 2
35
Start
Analyze Scripts: PowerShell
37
Start
Analyze Scripts: Powershell Part 2
46
Start
Vulnerability Scan Results
  1. ATTACKS AND EXPLOITS
38
Start
Info Gathering Techniques
39
Start
Info Gathering Techniques Part 2
40
Start
Info Gathering Techniques Part 3
41
Start
Info Gathering Techniques Part 4
42
Start
Perform Vulnerability Scans
43
Start
Perform Vulnerability Scans Part 2
44
Start
Perform Vulnerability Scans Part 3
45
Start
Perform Vulnerability Scans Part 4
47
Start
Exploration Preparation
48
Start
Exploration Preparation Part 2
49
Start
Weaknesses in Specialized Systems
50
Start
Weaknesses in Specialized Systems Part 2
  1. PENETRATION TESTING TOOLS
51
Start
Social Engineering
52
Start
Social Engineering Part 2
53
Start
Network Vulnerability: Name Resolution
54
Start
Network Vulnerability: SNMP, SMTP and FTP
55
Start
Network Vulnerability: Pass-the-Hash
56
Start
Network Vulnerabilities: MITM
57
Start
Network Vulnerability Denial of Service
58
Start
Network Vulnerabilities: NAC Bypass, VLAN Hopping
59
Start
App Vulnerabilities Injection Attacks
60
Start
App Vulnerabilities Injection Attacks Part 2
61
Start
App Vulnerabilities: Injection Attacks Part 3
62
Start
App Vulnerabilities: File Inclusions
63
Start
App Vulnerabilities: File Inclusions Part 2
64
Start
App Vulnerabilities: XSS, CSRF, Clickjacking
65
Start
App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
67
Start
App Vulnerabilities: Authentication, Authorization
68
Start
App Vulnerabilities: Insecure Coding
70
Start
Wireless and RF Vulnerabilities
71
Start
Wireless and RF Vulnerabilities Part 2
72
Start
Host-Based Vulnerabilities
73
Start
Host Based Vulnerabilities Part 2
74
Start
Host Based Vulnerabilites Part 3
75
Start
Host-Based Vulnerabilities Part 4
76
Start
Host-Based Vulnerabilities Part 5
77
Start
Site Security
78
Start
Site Security Part 2
79
Start
Post-Exploitation
80
Start
Post-Exploitation Part 2
  1. REPORTING AND COMMUNICATION
81
Start
Reports
82
Start
Post Report Activities
83
Start
Vulnerability Mitigation Strategies
84
Start
Communication Importance
E-COURSE Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
  • 34:31:00
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee