Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Introduction

    • Welcome to the course!

    • Exam Foundations

    • How to Schedule Your Exam

    • An Important Message About the Course

    • This section contains PDFs

  • 2

    Domain 1: Planning and Scoping

    • Planning and Scoping (Overview)

    • Penetration Testing Methodology

    • Planning a Penetration Test

    • Rules of Engagement

    • Legal Concepts

    • Testing Strategies

    • White Box Support Resources

    • Types of Assessments

    • Threat Actors

    • Target Selection

    • Other Scoping Considerations

    • Domain 1 Quiz

  • 3

    Domain 2: Information Gathering and Vulnerability Identification

    • Information Gathering and Vulnerability Identification (Overview)

    • Information Gathering

    • Reconnaissance with CentralOps (Demo)

    • Scanning and Enumeration

    • Fingerprinting

    • Scanning and Enumeration (Demo)

    • Cryptographic Inspection

    • Eavesdropping

    • Decompiling and Debugging

    • Open Source Research

    • Vulnerability Scanning

    • Scanning Considerations

    • Application and Container Scans

    • Analyzing Vulnerability Scans

    • Leverage Information for Exploit

    • Common Attack Vectors

    • Weaknesses in Specialized Systems

    • Domain 2 Quiz

  • 4

    Domain 3: Attacks and Exploits

    • Attacks and Exploits (Overview)

    • Social Engineering

    • Motivation Factors

    • Physical Security Attacks

    • Lock Picking (Demo)

    • Network-based Vulnerabilities

    • Wireless-based Vulnerabilities

    • Wireless Network Attack (Demo)

    • Application-based Vulnerabilities

    • Local Host Vulnerabilities

    • Privilege Escalation (Linux)

    • Privilege Escalation (Windows)

    • Privilege Escalation

    • Privilege Escalation (Demo)

    • Lateral Movement

    • Persistence

    • Covering Your Tracks

    • Persistence and Covering Tracks (Demo)

    • Domain 3 Quiz

  • 5

    Domain 4: Penetration Testing Tools

    • Penetration Testing Tools (Overview)

    • Nmap Usage

    • Nmap Usage (Demo)

    • Use Cases for Tools

    • Scanners

    • Credential Testing Tools

    • John the Ripper (Demo)

    • Debuggers

    • Software Assurance

    • OSINT

    • Wireless

    • Web Proxy and Demo

    • Social Engineering Tools

    • Remote Access Tools

    • Networking Tools

    • Mobile Tools

    • Miscellaneous Tools

    • Intro to Programming

    • BASH Script Example

    • Programming Concepts

    • Python Script Example

    • PowerShell Script Example

    • Ruby Script Example

    • Domain 4 Quiz

  • 6

    Domain 5: Reporting and Communication

    • Reporting and Communication (Overview)

    • Pentest Communications

    • Report Writing

    • Mitigation Strategies

    • Post-Report Activities

    • Pentest Report Example

    • Domain 5 Quiz

  • 7

    Conclusion

    • Conclusion

    • Creating Your Pentest Lab

    • Files for Creating Your Pentest Lab

  • 8

    PENTEST+ (PT0-001) Practice Exam

    • Pentest+ (PT1-001) Full Length Practice Exam

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...