Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA PenTest+ (PT0-001) Ethical Hacking - The Total Course
Introduction to PenTest+
Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking (8:40)
Chapter 1: Planning and Scoping
Planning a Pen Test (8:54)
Rules of Engagement (10:41)
Resources and Budgets (7:21)
Impact and Constraints (5:17)
Support Resources (13:26)
Legal Groundwork (11:57)
Scope Considerations (10:51)
Lab Environment Setup (22:56)
Project Strategy and Risk (9:24)
Scope Vulnerabilities (13:32)
Compliance-Based Assessments (5:25)
Chapter 2: Surveying the Target
Scanning and Enumeration (4:35)
Scanning and Enumeration Demo (10:59)
Packet Investigation (8:03)
Packet Inspection Demo (6:02)
Application and Open-Source Resources (11:52)
Vulnerability Scanning (8:50)
Vulnebarility Scanning Demo (16:31)
Target and Asset Considerations (15:39)
Nmap Timing and Performance Options (6:43)
Prioritization of Vulnerabilities (9:17)
Common Attack Techniques (12:17)
Credential Attacks (14:41)
Weaknesses in Specialized Systems (18:08)
Chapter 3: Selecting Your Attack Vector
Remote Social Engineering (6:50)
Spear Phishing Demo (10:19)
In-Person Social Engineering (12:00)
Network-Based Exploits (7:19)
FTP Exploit Demo (8:28)
Man-in-the Middle Exploits (7:18)
Wireless Exploits (13:29)
Application Exploits, Part 1 (5:41)
SQL Injection Demo (8:48)
Application Exploits, Part 2 (8:14)
Application Exploits, Part 3 (9:15)
Cross-Site Scripting Demo (7:11)
Code Vulnerabilities (16:48)
Local Host Vulnerabilities (5:08)
Privilege Escalation (Linux) (9:49)
Privilege Escalation (Windows) (6:17)
Misc. Privilege Escalation (8:07)
Misc. Local Host Vulnerabilities (8:17)
Physical Security (11:27)
Post-Exploitation Techniques (11:23)
Persistence and Stealth (10:55)
Chapter 4: Selecting Pen Testing Tools
Nmap Scoping and Output Options (21:15)
Pen Testing Toolbox (6:59)
Using Kali Linux (6:27)
Scanners and Credential Tools (10:22)
Code Cracking Tools (4:35)
Open-Source Research Tools (6:36)
Wireless and Web Pen Testing Tools (11:03)
Remote Access Tools (6:28)
Analyzers and Mobile Pen Testing Tools (2:43)
Other Pen Testing Tools (4:39)
Using Scripting in Pen Testing (12:46)
Bash Scripting Basics (15:10)
Bash Scripting Techniques (10:21)
PowerShell Scripts (4:16)
Ruby Scripts (6:43)
Python Scripts (5:59)
Scripting Languages Comparison (11:06)
Chapter 5: Reporting and Communication
Writing Reports (16:02)
Post-Report Activities (5:36)
Mitigation Strategies (5:13)
Communication (9:54)
Vulnerability Scanning
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock