Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The All-in-One CompTIA PenTest+ Certification (PT0-002) with Practice Exam
01 Compare and contrast governance, risk, and compliance concepts
➡️ WHERE TO BEGIN: Recommended Course Order
Did you watch these prerequisites?
01.01 Regulatory compliance considerations (8:07)
01.02 Location Restrictions (8:07)
01.03 Legal concepts (8:54)
Source Files
02 Explain the importance of scoping and organizationalcustomer requirements
02.01 Standards and methodologies (17:22)
02.02 Rules of engagement (7:21)
02.03 Environmental considerations (8:46)
02.04 Target list (7:52)
02.05 Validate scope of engagement (8:04)
Source Files
03 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
03.01 Maintaining Professionalism and Integrity (6:56)
Source Files
04 Given a scenario, perform passive reconnaissance
04.01 Passive Reconnassaince (24:43)
Source Files
05 Given a scenario, perform active reconnaissance
05.01 Enumeration (5:48)
05.02 Website reconnaissance (4:14)
05.03 Defense detection (5:45)
05.04 Tokens (5:53)
05.05 Other Methods of Active Reconnaissance (3:32)
Source Files
06 Given a scenario, analyze the results of a reconnaissance exercise
06.01 Analyze the results of Reconnaissance (6:42)
Source Files
07 Given a scenario, perform vulnerability scanning
07.01 Considerations of vulnerability scanning (13:42)
07.02 Scanning methods (8:37)
07.03 Nmap (6:36)
07.04 Vulnerability testing tools that facilitate automation (5:32)
Source Files
08 Given a scenario, research attack vectors and perform network attacks
08.01 Stress testing for availability (10:08)
08.02 Exploit resources (5:13)
08.03 Attacks (27:43)
08.04 Tools (4:33)
Source Files
09 Given a scenario, research attack vectors and perform wireless attacks
09.01 Attack methods (15:55)
09.02 Attacks (7:33)
09.03 Tools (5:25)
Source Files
10 Given a scenario, research attack vectors and perform application-based attacks
10.02 Other Application-based Attacks (5:34)
10.01 OWASP Top 10 (15:37)
10.03 Application vulnerabilities (21:59)
10.04 API Attacks (9:55)
10.05 Tools (10:09)
10.06 Resources (4:16)
Source Files
11 Given a scenario, research attack vectors and perform attacks on cloud technologies
11.01 Attacks on Cloud Technologies (38:07)
11.02 Tools (4:22)
Source Files
12 Explain common attacks and vulnerabilities against specialized systems
12.01 Mobile Attacks (4:08)
12.02 Mobile Vulnerabilities (12:58)
12.03 Tools (12:24)
12.04 Internet of Things (IoT) devices (5:32)
12.05 Vulnerabilities (3:01)
12.06 Data storage system vulnerabilities (11:01)
12.07 Management interface vulnerabilities (4:29)
12.08 Vulnerabilities Related to SCADA and ICS (9:04)
12.09 Vulnerabilities related to virtual environments (1:55)
12.10 Vulnerabilities Related to Containerized Workloads (2:54)
Source Files
13 Given a scenario, perform a social engineering or physical attack
13.02 Social engineering attacks (21:17)
13.01 Pretext for an approach (85:21)
13.03 Physical attacks (4:52)
13.04 Tools (16:15)
13.05 Methods of influence (4:43)
Source Files
14 Given a scenario, perform post-exploitation techniques
14.02 Lateral movement (4:15)
14.01 Post-exploitation tools (6:15)
14.03 Network segmentation testing (4:35)
14.04 Privilege escalation (3:32)
14.05 Upgrading a restrictive shell (4:06)
14.06 Creating a foothold_persistence (3:42)
14.07 Detection avoidance (4:43)
14.08 Enumeration (6:57)
Source Files
15 Compare and contrast important components of written reports
15.01 Components of Written Reports (7:16)
Source Files
16 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
16.01 Recommend Remediation in a Report (7:47)
Source Files
17 Explain the importance of communication during the penetration testing process
17.01 Importance of Communication (5:40)
Source Files
18 Explain post-report delivery activities
18.01 Post-report Delivery Activities (5:59)
Source Files
19 Explain the basic concepts of scripting and software development
19.01 Logic Constructs (5:37)
19.02 Data Structures (4:28)
19.03 Other Software Development Concepts (2:42)
Source Files
20 Given a scenario, analyze a script or code sample for use in a penetration test
20.01 Analyze a Script or Code Sample (6:09)
Source Files
21 Explain use cases of the following tools during the phases of a penetration test
21.01 Scanners (17:47)
21.02 Credential Testing Tools (7:52)
21.03 Debuggers (5:40)
21.04 OSINT (5:12)
21.05 Wireless Tools (6:56)
21.06 Web Application Tools (3:22)
21.07 Social engineering tools (2:11)
21.08 Remote access tools (3:39)
21.09 Networking tools (1:49)
21.10 Misc Tools (8:20)
21.11 Steganography tools (5:04)
21.12 Cloud tools (3:47)
Source Files
Test Your Knowledge
Practice Exam
07.01 Considerations of vulnerability scanning
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock