Oreilly - CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam - 9781838824105
Oreilly - CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
by Jason Dion | Publisher: Packt Publishing | Release Date: March 2019 | ISBN: 9781838824105


Pass the CompTIA Pentest+ (PT0-001) exam on your 1st attempt, includes a Pentest+ practice exam!About This VideoTake and pass the CompTIA Pentest+ (PT0-001) certification examUnderstand the penetration testing methodologyUnderstand how to plan and scope a penetration testIn DetailThe CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment, understand the legal/compliance requirements, perform vulnerability scanning/penetration test, and analyze/report on your findings. This certification was released by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA Pentest+ exam is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course).The CompTIA Pentest+ exam covers FIVE domains:15%: Planning and Scoping22%: Information Gathering and Vulnerability Identification30%: Attacks and Exploits17%: Penetration Testing Tools16%: Reporting and Communication.This course provides everything you need in order to study for the CompTIA Pentest+ exam, including downloadable PDFs of every lecture to follow along with as you progress through the videos and to review before test day. Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Pentest+ exam or to better prepare yourself to serve on your organization's cyber defence team or as an independent penetration tester.
  1. Chapter 1 : Introduction
    • Welcome to the course! 00:04:17
    • Exam Foundations 00:04:12
  2. Chapter 2 : Domain 1: Planning and Scoping
    • Planning and Scoping (Overview) 00:01:28
    • Penetration Testing Methodology 00:03:02
    • Planning a Penetration Test 00:08:08
    • Rules of Engagement 00:05:39
    • Legal Concepts 00:11:00
    • Testing Strategies 00:03:05
    • White Box Support Resources 00:06:35
    • Types of Assessments 00:05:48
    • Threat Actors 00:07:41
    • Target Selection 00:05:16
    • Other Scoping Considerations 00:07:10
  3. Chapter 3 : Domain 2: Information Gathering and Vulnerability Identification
    • Information Gathering and Vulnerability Identification (Overview) 00:02:41
    • Information Gathering 00:10:12
    • Reconnaissance with CentralOps (Demo) 00:13:18
    • Scanning and Enumeration 00:04:30
    • Fingerprinting 00:04:19
    • Scanning and Enumeration (Demo) 00:16:00
    • Cryptographic Inspection 00:01:33
    • Eavesdropping 00:03:25
    • Decompiling and Debugging 00:02:53
    • Open Source Research 00:06:18
    • Vulnerability Scanning 00:08:52
    • Scanning Considerations 00:05:41
    • Application and Container Scans 00:02:57
    • Analyzing Vulnerability Scans 00:07:12
    • Leverage Information for Exploit 00:03:23
    • Common Attack Vectors 00:06:08
    • Weaknesses in Specialized Systems 00:10:31
  4. Chapter 4 : Domain 3: Attacks and Exploits
    • Attacks and Exploits (Overview) 00:02:01
    • Social Engineering 00:12:19
    • Motivation Factors 00:07:16
    • Physical Security Attacks 00:05:31
    • Lock Picking (Demo) 00:01:29
    • Network-based Vulnerabilities 00:13:47
    • Wireless-based Vulnerabilities 00:08:45
    • Wireless Network Attack (Demo) 00:05:53
    • Application-based Vulnerabilities 00:18:52
    • Local Host Vulnerabilities 00:03:01
    • Privilege Escalation (Linux) 00:04:51
    • Privilege Escalation (Windows) 00:10:44
    • Privilege Escalation 00:05:11
    • Privilege Escalation (Demo) 00:04:32
    • Lateral Movement 00:09:12
    • Persistence 00:06:50
    • Covering Your Tracks 00:05:41
    • Persistence and Covering Tracks (Demo) 00:07:53
  5. Chapter 5 : Domain 4: Penetration Testing Tools
    • Penetration Testing Tools (Overview) 00:02:49
    • Nmap Usage 00:10:16
    • Nmap Usage (Demo) 00:11:55
    • Use Cases for Tools 00:07:28
    • Scanners 00:02:08
    • Credential Testing Tools 00:06:44
    • Password Cracking (Demo) 00:02:19
    • Debuggers 00:02:41
    • Software Assurance 00:02:14
    • OSINT 00:04:49
    • Wireless 00:01:49
    • Web Proxies 00:08:58
    • Social Engineering Tools 00:01:18
    • Remote Access Tools 00:07:25
    • Networking Tools 00:01:35
    • Mobile Tools 00:02:05
    • Miscellaneous Tools 00:04:28
    • Intro to Programming 00:02:58
    • Programming Concepts 00:21:52
    • BASH Script Example 00:04:34
    • Python Script Example 00:03:45
    • PowerShell Script Example 00:03:28
    • Ruby Script Example 00:04:28
  6. Chapter 6 : Domain 5: Reporting and Communication
    • Reporting and Communication (Overview) 00:01:55
    • Pentest Communications 00:08:42
    • Report Writing 00:07:59
    • Mitigation Strategies 00:07:28
    • Post-Report Activities 00:04:21
    • Pentest Report Example 00:00:47
  7. Chapter 7 : Conclusion
    • Conclusion 00:01:56
    • How to Schedule Your Exam 00:03:33
    • Creating Your Pentest Lab 00:09:04
  8. Oreilly - CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss