Ethical Hacking and CompTIA PenTest+

Securium Solutions Team, your hotspot for smash hit network protection courses, presents to you this moral hacking and entrance testing course with your educator Michael Solomon, Ph.D., CISSP, PMP, CISM.

With 30+ long stretches of involvement with security, protection, blockchain, and information science, and a lively introduction style, Michael takes his capability in network infiltration testing and merges it into this enlightening and connecting course.

For what reason SHOULD I TAKE THIS COURSE?

Did you realize entrance analyzers’ normal compensation is $71,929?* And this vocation is in one of the quickest developing position markets**.

Regardless of whether you’re hoping to breeze through the CompTIA PenTest+ accreditation test, make your next stride in the CompTIA Cybersecurity Pathway, or you’re simply hoping to get familiar with some wonderful moral hacking abilities, you’re in the correct spot.

Remember there’s considerably more to being a moral programmer than what’s covered here, including how to get an organization, anyway this course centers around how to be a pen analyzer. A pen analyzer plans and extensions a pen test commitment with a customer, discovers weaknesses, misuses them to get into an organization, at that point writes about those discoveries to the customer.

This course tells you the best way to:

  • Utilize the apparatuses you’ll have to filter organizations, break passwords, investigate and capture traffic, find code weaknesses, and bargain assets
  • Perceive weaknesses inside a framework, run abuses, and propose answers for a customer to remediate the flimsy parts
  • Work inside a virtual climate to rehearse your pen testing abilities, including utilizing Oracle VM director, Kali Linux, Metasploitable, and DVWA
  • Degree, plan, and execute a pen test commitment beginning to end

WHAT’S COVERED?

Exam Domain – Percentage of Exam

1.0 Planning and Scoping – 15%

  • Explain the importance of planning for an engagement
  • Explain key legal concepts
  • Explain the importance of scoping an engagement properly
  • Explain the key aspects of compliance-based assessments

2.0 Information Gathering and Vulnerability Identification – 22%

  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan
  • Given a scenario, analyze vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation
  • Explain weaknesses related to specialized systems

3.0 Attacks and Exploits – 30%

  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summarize physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques

4.0 Penetration Testing Tools – 17%

  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyze tool output or data related to a penetration test
  • Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)

5.0 Reporting and Communication – 16%

  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

EXAM INFO

Exam code: PT0-001

Max. 85 questions (performance-based and multiple choice)

Length of exam: 165 minutes

Passing score: 750 (on a scale of 100-900)

Recommended experience: Network+, Security+ or equivalent knowledge, minimum 3-4 years hands-on information security or related experience (no required prerequisites to sit for the PenTest+ exam)

Chapter 1: Planning and Scoping

1
01 – Planning a Pen Test
2
02 – Rules of Engagement
3
03 – Resources and Budget
4
04 – Impact and Constraints
5
05 – Support Resources
6
06 – Legal Groundwork
7
07 – Scope Considerations
8
08 – Lab Environment Setup
9
09 – Project Strategy and Risk
10
10 – Scope Vulnerabilities
11
11 – Compliance-Based Assessments

Chapter 2: Surveying the Target

1
01 – Scanning and Enumeration
2
02 – Scanning Demo
3
03 – Packet Investigation
4
04 – Packet Inspection Demo
5
05 – Application and Open-Source Resources
6
06 – Vulnerability Scanning
7
07 – Vulnerability Scanning Demo
8
08 – Target Considerations Part 1
9
08 – Target Considerations Part 2
10
09 – Nmap Timing and Performance Options
11
10 – Prioritization of Vulnerabilities
12
11 – Common Attack Techniques
13
12 – Credential Attacks
14
13 – Weaknesses in Specialized Systems

Chapter 3: Selection Your Attack Vector

1
01 – Remote Social Engineering
2
02 – Spear Phishing Demo
3
03 – In-Person Social Engineering
4
04 – Network-Based Exploits
5
05 – FTP Exploit Demo
6
06 – Man-in-the-middle Exploits
7
07 – Wireless Exploits
8
08 – Application Exploits, Part 1
9
09 – SQL Injection Demo
10
10 – Application Exploits, Part 2
11
11 – Application Exploits, Part 3
12
12 – Cross-Site Scripting Demo
13
13 – Code Vulnerabilities – Part 1
14
13 – Code Vulnerabilities – Part 2
15
14 – Local Host Vulnerabilities
16
15 – Privilege Escalation (Linux)
17
16 – Privelege Escalation (Windows)
18
17 – Misc. Privilege Escalation
19
18 – Misc. Local Host Vulnerabilities
20
19 – Physical Security
21
20 – Post-Explitation Techniques
22
21 – Persistence and Stealth

Chapter 4: Selecting Pen Testing Tools

1
01 – Nmap Scoping and Output Options – Part 1
2
01 – Nmap Scoping and Output Options – Part 2
3
02 – Pen Testing Toolbox
4
03 – Using Kali Linux
5
04 – Scanners and Credential Tools
6
05 – Code-Cracking Tools
7
06 – Open-Source Research Tools
8
07 – Wireless and Web Pen Testing Tools
9
08 – Remote Access Tools
10
09 – Analyzers and Mobile Pen Testing Tools
11
10 – Other Pen Testing Tools
12
11 – Using Scripting in Pen Testing
13
12 – Bash Scripting Basics
14
13 – Bash Scripting Techniques
15
14 – PowerShell Scripts
16
15 – Ruby Scripts
17
16 – Python Scripts
18
17 – Scripting Languages Comparison

Chapter 5: Reporting and Communication

1
01 – Writing Reports – Part 1
2
01 – Writing Reports – Part 2
3
02 – Post-Report Activities
4
03 – Mitigation Strategies
5
04 – Communications

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 70

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

Ethical Hacking and CompTIA PenTest+
Price:
$30