Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Pentest + (Pt0-002)

    Posted By: ELK1nG
    Comptia Pentest + (Pt0-002)

    Comptia Pentest + (Pt0-002)
    Published 5/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 18.68 GB | Duration: 17h 49m

    Certificate Exam Preparatory Course

    What you'll learn

    Plan and scope penetration tests

    Conduct passive reconnaissance

    Conduct active reconnaissance

    Analyze vulnerabilities

    Penetrate networks

    Penetrate applications

    Exploit wireless networks

    Perform social engineering

    Report and communicate penetration test findings

    Requirements

    The CompTIA PenTest+ certification program does not have formal prerequisites, it is recommended that candidates have some prior experience in the field of penetration testing and vulnerability assessment, as well as a solid understanding of network and security fundamentals.

    Description

    CompTIA PenTest+ is a certification program designed for professionals who specialize in penetration testing. This certification program validates the skills required to perform penetration testing, vulnerability assessment, and management, and is an intermediate-level certification that is ideal for those with some experience in the field.The course covers various topics, including how to plan and scope penetration tests, how to perform reconnaissance, how to analyze vulnerabilities, how to exploit vulnerabilities, and how to report and communicate findings. It also covers topics such as web application, network, wireless, and mobile device penetration testing.1. Plan and scope penetration tests2. Conduct passive reconnaissance3. Conduct active reconnaissance4. Analyze vulnerabilities5. Penetrate networks6. Penetrate applications7. Exploit wireless networks8. Perform social engineering9. Report and communicate penetration test findingsOverall, the CompTIA PenTest+ certification program provides a comprehensive and practical approach to penetration testing, and is an excellent choice for professionals looking to develop their skills in this field. The course is for professionals who are responsible for performing penetration testing engagements, including planning and scoping, reconnaissance, vulnerability assessment, and penetration testing.The CompTIA PenTest+ certification program does not have formal prerequisites, it is recommended that candidates have some prior experience in the field of penetration testing and vulnerability assessment, as well as a solid understanding of network and security fundamentals.

    Overview

    Section 1: Planning and Scoping

    Lecture 1 Overview

    Lecture 2 Regulation and Compliance

    Lecture 3 Common Pentest Restrictions

    Lecture 4 Legal Concepts and Documents

    Lecture 5 Standards and Methodologies

    Lecture 6 Scoping an Engagement

    Lecture 7 Professionalism and Integrity

    Section 2: Information Gathering and Vulnerability Scanning

    Lecture 8 DNS Recon

    Lecture 9 Target Recon

    Lecture 10 Host Discovery and Enumeration

    Lecture 11 Web and Cloud Discovery and Enumeration

    Lecture 12 Defense Detection and Avoidance

    Lecture 13 Vulnerability Scanning

    Lecture 14 Nmap

    Section 3: Attacks and Exploits

    Lecture 15 Exploit Resources

    Lecture 16 Denial of Service

    Lecture 17 ARP and DNS Poisoning

    Lecture 18 Password Attacks

    Lecture 19 VLAN Hopping

    Lecture 20 MAC Spoofing

    Lecture 21 Wireless Attacks

    Lecture 22 OWASP Top 10 Web App Security Risks

    Lecture 23 SSRF Attacks

    Lecture 24 Business Logic Flaws

    Lecture 25 SQL Injection Attacks

    Lecture 26 Other Injection Attacks

    Lecture 27 XSS Attacks

    Lecture 28 Session Attacks

    Lecture 29 API Attacks

    Lecture 30 Cloud Attacks

    Lecture 31 Mobile Attacks

    Lecture 32 IoT Hacking

    Lecture 33 Data Storage System Vulnerabilities

    Lecture 34 ICS SCADA and IIOT Vulnerabilities

    Lecture 35 Virtual Environment Vulnerabilities

    Lecture 36 Container Vulnerabilities

    Lecture 37 Social Engineering and Physical Attacks

    Lecture 38 Post Exploitation Enumeration and Tools

    Lecture 39 Network Segmentation Testing

    Lecture 40 Privilege Escalation

    Lecture 41 Persistence

    Lecture 42 Detection Avoidance

    Section 4: Reporting and Communication

    Lecture 43 Components of Written Reports

    Lecture 44 Recommended Remediations

    Lecture 45 Communication During a Pentest

    Lecture 46 Post Report Delivery Activities

    Section 5: Tools and Code Analysis

    Lecture 47 Basic Programming Concepts

    Lecture 48 Analyze Scripts Or Code For Use In A Pentest

    Lecture 49 Opportunities for Automation

    Penetration testers: Professionals who are responsible for performing penetration testing engagements, including planning and scoping, reconnaissance, vulnerability assessment, and penetration testing.,Vulnerability assessment analysts: Professionals who are responsible for identifying and analyzing vulnerabilities in target systems and networks, including vulnerability assessment, vulnerability scanning, and vulnerability exploitation.,Security analysts: Professionals who are responsible for securing networks, systems, and applications, including implementing security controls, monitoring for security threats, and responding to security incidents.,Ethical hackers: Professionals who are responsible for testing the security of networks, systems, and applications, including using techniques such as penetration testing, vulnerability assessment, and social engineering.,Information security professionals: Professionals who are responsible for securing information and systems against security threats, including implementing security controls, monitoring for security threats, and responding to security incidents.