CompTIA PenTest+ (PT0-001) – Penetration Testing
CompTIA PenTest+ (PT0-001) – Penetration Testing

CompTIA PenTest+ (PT0-001) – Penetration Testing

$49
Instructor
Category
Reviews
Rating

About this Course

This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the PT0-001 exam while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are mostly Kali Linux-based, covering a broad range of real-world examples used by penetration testers and red teams.

The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.

In this course you will learn hands-on penetration testing and hacking skills including:
– Client engagement and documentation
– Passive and active reconnaissance
– Windows, Linux, and mobile device system hacking
– Physical security testing and social engineering
– Wired and wireless network hacking and exploitation
– Network service hacking and exploitation
– Application and web app hacking and exploitation
– Lateral movement and persistence in a compromised network
– Covering your tracks
– Report writing and post-test cleanup

This course is intended for advanced students and cybersecurity practitioners who will actively test networks and computer systems for vulnerabilities. Successful completion of two pre-requisite courses, Network+ and Security+, is highly recommended.

Course Outline

  • 1.0 The Pen Test Engagement
  •  2.0 Passive Reconnaissance
  •  3.0 Active Reconnaissance
  •  4.0 Physical Security Tests
  • 5.0 Social Engineering
  •  6.0 Vulnerability Analysis
  •  7.0 Password Cracking
  •  8.0 Penetrating Networks
  •  9.0 Windows Exploits
  •  10.0 Linux Exploits
  •  11.0 Mobile Devices
  •  12.0 Specialized Systems
  •  13.0 Application Testing
  •  14.0 Web Apps
  •  15.0 Scripts
  •  16.0 Lateral Movement
  •  17.0 Persistence
  •  18.0 Cover Your Tracks
  •  19.0 The Report
  •   20.0 Post Engagement Cleanup

Reviews

0 Rated 0 out of 0 Ratings
5 stars
4 stars
3 stars
2 stars
1 stars