Course Highlights
The CompTIA PenTest+ Ethical Hacking Course is a comprehensive and up-to-date course that will teach you everything you need to know to become a professional penetration tester. Embark on an exhilarating journey into the world of cybersecurity with our “CompTIA PenTest+ Ethical Hacking Course.” In this immersive learning experience, you’ll explore six captivating sections that will equip you with the skills and knowledge of an ethical hacker. Begin with an introduction that sets the stage for your transformation into a cybersecurity expert. Delve into planning and scoping to understand the importance of meticulous preparation in ethical hacking endeavours.
As you progress, you’ll learn the art of surveying the target, identifying vulnerabilities, and assessing potential risks. Select your attack vector carefully and master the intricacies of using pen testing tools effectively. Finally, learn the art of clear and concise reporting and effective communication of your findings, essential skills for any ethical hacker.
Learning outcome
- Identify and exploit security vulnerabilities in computer systems and networks
- Plan and execute penetration tests
- Report on the results of penetration tests
- Comply with ethical hacking best practices
Course media
Why should I take this course?
- The demand for ethical hackers is growing rapidly.
- This course will teach you the skills you need to get a high-paying job in cybersecurity.
- This course is comprehensive and up-to-date.
- The course includes hands-on exercises that allow you to valuable your skills.
- The course is taught by experienced instructors who are passionate about ethical hacking.
Career Path
- Penetration Tester
- Security Analyst
- Network Security Engineer
- Security Consultant
- Security Architect
Requirements
- A basic understanding of computer networks and security
- A willingness to learn new skills
- A desire to protect organizations from cyberattacks
Course Curriculum
-
Introduction
00:09:00
-
Planning a Pen Test
00:09:00
-
Rules of Engagement
00:11:00
-
Resources and Budget
00:07:00
-
Impact and Constraints
00:05:00
-
Support Resources
00:13:00
-
Legal Groundwork
00:12:00
-
Scope Considerations
00:11:00
-
Project Strategy and Risk
00:09:00
-
Lab Environment Setup
00:23:00
-
Scope Vulnerabilities
00:14:00
-
Compliance-Based Assessments
00:05:00
-
Scanning and Enumeration
00:05:00
-
Scanning Demo
00:11:00
-
Packet Investigation
00:08:00
-
Packet Inspection Demo
00:06:00
-
Application and Open-Source Resources
00:12:00
-
Vulnerability Scanning
00:09:00
-
Vulnerability Scanning Demo
00:17:00
-
Target Considerations
00:16:00
-
Nmap Timing and Performance Options
00:07:00
-
Prioritization of Vulnerabilities
00:09:00
-
Common Attack Techniques
00:12:00
-
Credential Attacks
00:15:00
-
Weaknesses in Specialized Systems
00:18:00
-
Remote Social Engineering
00:07:00
-
Spear Phishing Demo
00:10:00
-
In-Person Social Engineering
00:12:00
-
Network-Based Exploits
00:07:00
-
FTP Exploit Demo
00:08:00
-
Man-in-the-middle Exploits
00:07:00
-
Wireless Exploits
00:14:00
-
Application Exploits, Part 1
00:06:00
-
SQL Injection Demo
00:09:00
-
Application Exploits, Part 2
00:08:00
-
Application Exploits, Part 3
00:09:00
-
Cross-Site Scripting Demo
00:07:00
-
Code Vulnerabilities
00:17:00
-
Local Host Vulnerabilities
00:05:00
-
Privilege Escalation (Linux)
00:10:00
-
Privilege Escalation (Windows)
00:06:00
-
Misc. Privilege Escalation
00:08:00
-
Misc. Local Host Vulnerabilities
00:08:00
-
Physical Security
00:11:00
-
Post-Exploitation Techniques
00:11:00
-
Persistence and Stealth
00:11:00
-
Nmap Scoping & Output Options
00:21:00
-
Pen Testing Toolbox
00:07:00
-
Using Kali Linux
00:06:00
-
Scanners & Credential Tools
00:10:00
-
Code-Cracking Tools
00:05:00
-
Open-Source Research Tools
00:07:00
-
Wireless and Web Pen Testing Tools
00:11:00
-
Remote Access Tools
00:06:00
-
Analyzers and Mobile Pen Testing Tools
00:03:00
-
Other Pen Testing Tools
00:05:00
-
Using Scripting in Pen Testing
00:13:00
-
Bash Scripting Basics
00:15:00
-
Bash Scripting Techniques
00:10:00
-
PowerShell Scripts
00:04:00
-
Ruby Scripts
00:07:00
-
Python Scripts
00:06:00
-
Scripting Languages Comparison
00:11:00
-
Writing Reports
00:16:00
-
Post-Report Activities
00:06:00
-
Mitigation Strategies
00:05:00
-
Communication
00:10:00
Offer Ends in

-
Duration:10 hours, 48 minutes
-
Access:1 Year
-
Units:67

