Ethical Hacking and CompTIA PenTest+
Securium Solutions Team, your hotspot for smash hit network protection courses, presents to you this moral hacking and entrance testing course with your educator Michael Solomon, Ph.D., CISSP, PMP, CISM.
With 30+ long stretches of involvement with security, protection, blockchain, and information science, and a lively introduction style, Michael takes his capability in network infiltration testing and merges it into this enlightening and connecting course.
For what reason SHOULD I TAKE THIS COURSE?
Did you realize entrance analyzers’ normal compensation is $71,929?* And this vocation is in one of the quickest developing position markets**.
Regardless of whether you’re hoping to breeze through the CompTIA PenTest+ accreditation test, make your next stride in the CompTIA Cybersecurity Pathway, or you’re simply hoping to get familiar with some wonderful moral hacking abilities, you’re in the correct spot.
Remember there’s considerably more to being a moral programmer than what’s covered here, including how to get an organization, anyway this course centers around how to be a pen analyzer. A pen analyzer plans and extensions a pen test commitment with a customer, discovers weaknesses, misuses them to get into an organization, at that point writes about those discoveries to the customer.
This course tells you the best way to:
- Utilize the apparatuses you’ll have to filter organizations, break passwords, investigate and capture traffic, find code weaknesses, and bargain assets
- Perceive weaknesses inside a framework, run abuses, and propose answers for a customer to remediate the flimsy parts
- Work inside a virtual climate to rehearse your pen testing abilities, including utilizing Oracle VM director, Kali Linux, Metasploitable, and DVWA
- Degree, plan, and execute a pen test commitment beginning to end
Exam Domain – Percentage of Exam
1.0 Planning and Scoping – 15%
- Explain the importance of planning for an engagement
- Explain key legal concepts
- Explain the importance of scoping an engagement properly
- Explain the key aspects of compliance-based assessments
2.0 Information Gathering and Vulnerability Identification – 22%
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan
- Given a scenario, analyze vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation
- Explain weaknesses related to specialized systems
3.0 Attacks and Exploits – 30%
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarize physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
4.0 Penetration Testing Tools – 17%
- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyze tool output or data related to a penetration test
- Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
5.0 Reporting and Communication – 16%
- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process
Exam code: PT0-001
Max. 85 questions (performance-based and multiple choice)
Length of exam: 165 minutes
Passing score: 750 (on a scale of 100-900)
Recommended experience: Network+, Security+ or equivalent knowledge, minimum 3-4 years hands-on information security or related experience (no required prerequisites to sit for the PenTest+ exam)