CompTIA Pentest (PT0-001) Complete Course, Practice Questions, and hands-on practice labs
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Welcome to the course!
Exam Foundations
How to Schedule Your Exam
An Important Message About the Course
This section contains PDFs
Planning and Scoping (Overview)
Penetration Testing Methodology
Planning a Penetration Test
Rules of Engagement
Legal Concepts
Testing Strategies
White Box Support Resources
Types of Assessments
Threat Actors
Target Selection
Other Scoping Considerations
Domain 1 Quiz
Information Gathering and Vulnerability Identification (Overview)
Information Gathering
Reconnaissance with CentralOps (Demo)
Scanning and Enumeration
Fingerprinting
Scanning and Enumeration (Demo)
Cryptographic Inspection
Eavesdropping
Decompiling and Debugging
Open Source Research
Vulnerability Scanning
Scanning Considerations
Application and Container Scans
Analyzing Vulnerability Scans
Leverage Information for Exploit
Common Attack Vectors
Weaknesses in Specialized Systems
Domain 2 Quiz
Attacks and Exploits (Overview)
Social Engineering
Motivation Factors
Physical Security Attacks
Lock Picking (Demo)
Network-based Vulnerabilities
Wireless-based Vulnerabilities
Wireless Network Attack (Demo)
Application-based Vulnerabilities
Local Host Vulnerabilities
Privilege Escalation (Linux)
Privilege Escalation (Windows)
Privilege Escalation
Privilege Escalation (Demo)
Lateral Movement
Persistence
Covering Your Tracks
Persistence and Covering Tracks (Demo)
Domain 3 Quiz
Penetration Testing Tools (Overview)
Nmap Usage
Nmap Usage (Demo)
Use Cases for Tools
Scanners
Credential Testing Tools
John the Ripper (Demo)
Debuggers
Software Assurance
OSINT
Wireless
Web Proxy and Demo
Social Engineering Tools
Remote Access Tools
Networking Tools
Mobile Tools
Miscellaneous Tools
Intro to Programming
BASH Script Example
Programming Concepts
Python Script Example
PowerShell Script Example
Ruby Script Example
Domain 4 Quiz
Reporting and Communication (Overview)
Pentest Communications
Report Writing
Mitigation Strategies
Post-Report Activities
Pentest Report Example
Domain 5 Quiz
Conclusion
Creating Your Pentest Lab
Files for Creating Your Pentest Lab
Pentest+ (PT1-001) Full Length Practice Exam
Eric Chu