Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The All-in-One CompTIA PenTest+ Certification (PT0-002) with Practice Exam
01 Compare and contrast governance, risk, and compliance concepts
➡️ WHERE TO BEGIN: Recommended Course Order
Did you watch these prerequisites?
01.01 Regulatory compliance considerations (8:07)
01.02 Location Restrictions (8:07)
01.03 Legal concepts (8:54)
Source Files
02 Explain the importance of scoping and organizationalcustomer requirements
02.01 Standards and methodologies (17:22)
02.02 Rules of engagement (7:21)
02.03 Environmental considerations (8:46)
02.04 Target list (7:52)
02.05 Validate scope of engagement (8:04)
Source Files
03 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
03.01 Maintaining Professionalism and Integrity (6:56)
Source Files
04 Given a scenario, perform passive reconnaissance
04.01 Passive Reconnassaince (24:43)
Source Files
05 Given a scenario, perform active reconnaissance
05.01 Enumeration (5:48)
05.02 Website reconnaissance (4:14)
05.03 Defense detection (5:45)
05.04 Tokens (5:53)
05.05 Other Methods of Active Reconnaissance (3:32)
Source Files
06 Given a scenario, analyze the results of a reconnaissance exercise
06.01 Analyze the results of Reconnaissance (6:42)
Source Files
07 Given a scenario, perform vulnerability scanning
07.01 Considerations of vulnerability scanning (13:42)
07.02 Scanning methods (8:37)
07.03 Nmap (6:36)
07.04 Vulnerability testing tools that facilitate automation (5:32)
Source Files
08 Given a scenario, research attack vectors and perform network attacks
08.01 Stress testing for availability (10:08)
08.02 Exploit resources (5:13)
08.03 Attacks (27:43)
08.04 Tools (4:33)
Source Files
09 Given a scenario, research attack vectors and perform wireless attacks
09.01 Attack methods (15:55)
09.02 Attacks (7:33)
09.03 Tools (5:25)
Source Files
10 Given a scenario, research attack vectors and perform application-based attacks
10.02 Other Application-based Attacks (5:34)
10.01 OWASP Top 10 (15:37)
10.03 Application vulnerabilities (21:59)
10.04 API Attacks (9:55)
10.05 Tools (10:09)
10.06 Resources (4:16)
Source Files
11 Given a scenario, research attack vectors and perform attacks on cloud technologies
11.01 Attacks on Cloud Technologies (38:07)
11.02 Tools (4:22)
Source Files
12 Explain common attacks and vulnerabilities against specialized systems
12.01 Mobile Attacks (4:08)
12.02 Mobile Vulnerabilities (12:58)
12.03 Tools (12:24)
12.04 Internet of Things (IoT) devices (5:32)
12.05 Vulnerabilities (3:01)
12.06 Data storage system vulnerabilities (11:01)
12.07 Management interface vulnerabilities (4:29)
12.08 Vulnerabilities Related to SCADA and ICS (9:04)
12.09 Vulnerabilities related to virtual environments (1:55)
12.10 Vulnerabilities Related to Containerized Workloads (2:54)
Source Files
13 Given a scenario, perform a social engineering or physical attack
13.02 Social engineering attacks (21:17)
13.01 Pretext for an approach (85:21)
13.03 Physical attacks (4:52)
13.04 Tools (16:15)
13.05 Methods of influence (4:43)
Source Files
14 Given a scenario, perform post-exploitation techniques
14.02 Lateral movement (4:15)
14.01 Post-exploitation tools (6:15)
14.03 Network segmentation testing (4:35)
14.04 Privilege escalation (3:32)
14.05 Upgrading a restrictive shell (4:06)
14.06 Creating a foothold_persistence (3:42)
14.07 Detection avoidance (4:43)
14.08 Enumeration (6:57)
Source Files
15 Compare and contrast important components of written reports
15.01 Components of Written Reports (7:16)
Source Files
16 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
16.01 Recommend Remediation in a Report (7:47)
Source Files
17 Explain the importance of communication during the penetration testing process
17.01 Importance of Communication (5:40)
Source Files
18 Explain post-report delivery activities
18.01 Post-report Delivery Activities (5:59)
Source Files
19 Explain the basic concepts of scripting and software development
19.01 Logic Constructs (5:37)
19.02 Data Structures (4:28)
19.03 Other Software Development Concepts (2:42)
Source Files
20 Given a scenario, analyze a script or code sample for use in a penetration test
20.01 Analyze a Script or Code Sample (6:09)
Source Files
21 Explain use cases of the following tools during the phases of a penetration test
21.01 Scanners (17:47)
21.02 Credential Testing Tools (7:52)
21.03 Debuggers (5:40)
21.04 OSINT (5:12)
21.05 Wireless Tools (6:56)
21.06 Web Application Tools (3:22)
21.07 Social engineering tools (2:11)
21.08 Remote access tools (3:39)
21.09 Networking tools (1:49)
21.10 Misc Tools (8:20)
21.11 Steganography tools (5:04)
21.12 Cloud tools (3:47)
Source Files
Test Your Knowledge
Practice Exam
09.01 Attack methods
Lesson content will be unlocked within 30 minutes.
Teachable is working on this bug.
No further action will be required on your part
.
Thank you for your patience