Course Curriculum
| Introduction | |||
| Introduction to the CompTIA PenTest+ (PT0-002) Course | 00:02:00 | ||
| About the CompTIA PenTest+ (PT0-002) Exam | 00:07:00 | ||
| Section 01: Planning and Engagement | |||
| Planning a Pen Test | 00:08:00 | ||
| Rules of Engagement | 00:10:00 | ||
| Regulatory Compliance | 00:04:00 | ||
| Resources and Budget | 00:07:00 | ||
| Impact and Constraints | 00:05:00 | ||
| Support Resources | 00:13:00 | ||
| Legal Groundwork | 00:12:00 | ||
| Service Provider Agreements | 00:02:00 | ||
| Standards and Methodologies, Part 1 | 00:07:00 | ||
| Standards and Methodologies, Part 2 | 00:09:00 | ||
| Environmental and Scoping Considerations | 00:14:00 | ||
| Ethical Mindset | 00:06:00 | ||
| Lab Environment Setup | 00:18:00 | ||
| Project Strategy and Risk | 00:09:00 | ||
| Scope Vulnerabilities | 00:13:00 | ||
| Compliance-Based Assessments | 00:04:00 | ||
| Section 02: Information Gathering and Vulnerability Scanning | |||
| Scanning and Enumeration | 00:04:00 | ||
| Scanning Demo | 00:11:00 | ||
| Packet Investigation | 00:08:00 | ||
| Packet Inspection Demo | 00:06:00 | ||
| Labtainers Setup | 00:12:00 | ||
| Labtainers Lab (Wireshark) | 00:09:00 | ||
| Application and Open-Source Resources | 00:12:00 | ||
| Passive Reconnaissance | 00:10:00 | ||
| Active Reconnaissance | 00:08:00 | ||
| Vulnerability Scanning | 00:09:00 | ||
| Vulnerability Scanning Demo | 00:16:00 | ||
| Labtainers Lab (Network Basics) | 00:03:00 | ||
| Labtainers Lab (Nmap Discovery) | 00:03:00 | ||
| Target Considerations | 00:16:00 | ||
| Analyzing Scan Output | 00:06:00 | ||
| Nmap Scoping and Output Options | 00:21:00 | ||
| Nmap Timing and Performance Options | 00:07:00 | ||
| Prioritization of Vulnerabilities | 00:09:00 | ||
| Common Attack Techniques | 00:12:00 | ||
| Automating Vulnerability Scans | 00:04:00 | ||
| Credential Attacks | 00:15:00 | ||
| Labtainers Lab (Password Cracking) | 00:02:00 | ||
| Labtainers Lab (Secure Socket Layers) | 00:03:00 | ||
| Labtainers Lab (Routing Basics) | 00:02:00 | ||
| Section 03: Network-Based Attacks | |||
| Exploit Resources and Network Attacks | 00:05:00 | ||
| Network-Based Exploits | 00:07:00 | ||
| FTP Exploit Demo | 00:08:00 | ||
| Man-in-the-middle Exploits | 00:07:00 | ||
| Labtainers Lab (TCP/IP Attacks) | 00:02:00 | ||
| Labtainers Lab (ARP Spoof Attacks) | 00:02:00 | ||
| Labtainers Lab (Local DNS Attacks) | 00:02:00 | ||
| Labtainers Lab (MACs and Hash Functions) | 00:01:00 | ||
| Section 04: Selecting Pen Testing Tools | |||
| Wireless Exploits, Part 1 | 00:13:00 | ||
| Wireless Exploits, Part 2 | 00:03:00 | ||
| Antennas | 00:04:00 | ||
| Section 05: Reporting and Communication | |||
| OWASP Top 10 | 00:09:00 | ||
| Application Exploits, Part 1 | 00:06:00 | ||
| SQL Injection Demo | 00:09:00 | ||
| Labtainers Lab (SQL Injection) | 00:03:00 | ||
| Application Exploits, Part 2 | 00:08:00 | ||
| Application Exploits, Part 3 | 00:09:00 | ||
| Cross-Site Scripting Demo | 00:07:00 | ||
| Labtainers Lab (Cross-Site Scripting) | 00:02:00 | ||
| Labtainers Lab (Cross-Site Request Forgery) | 00:01:00 | ||
| Code Vulnerabilities | 00:17:00 | ||
| API Attacks and Attack Resources | 00:06:00 | ||
| Privilege Escalation (Linux) | 00:10:00 | ||
| Privilege Escalation (Windows) | 00:06:00 | ||
| Misc. Privilege Escalation | 00:08:00 | ||
| Misc. Local Host Vulnerabilities | 00:08:00 | ||
| Section 06: Attacking the Cloud | |||
| Cloud Attacks, Part 1 | 00:05:00 | ||
| Cloud Attacks, Part 2 | 00:05:00 | ||
| Section 07: Specialized and Fragile Systems | |||
| Mobile Attacks | 00:10:00 | ||
| IoT Attacks | 00:10:00 | ||
| Data Storage and Management Interface Attacks | 00:09:00 | ||
| Virtual and Containerized Environment Attacks | 00:08:00 | ||
| Labtainers Lab (Industrial Control System) | 00:02:00 | ||
| Section 08: Social Engineering and Physical Attacks | |||
| Pretext for a Social Engineering Attack | 00:03:00 | ||
| Remote Social Engineering | 00:06:00 | ||
| Spear Phishing Demo | 00:10:00 | ||
| In-Person Social Engineering | 00:12:00 | ||
| Physical Security | 00:11:00 | ||
| Section 09: Post-Exploitation | |||
| Post-Exploitation Techniques | 00:11:00 | ||
| Post-Exploitation Tools | 00:03:00 | ||
| Network Segmentation Testing | 00:03:00 | ||
| Persistence and Stealth | 00:11:00 | ||
| Detection Avoidance Techniques | 00:06:00 | ||
| Section 10: Post-Engagement Activities | |||
| Report Writing | 00:15:00 | ||
| Important Components of Written Reports | 00:03:00 | ||
| Mitigation Strategies | 00:05:00 | ||
| Technical and Physical Controls | 00:04:00 | ||
| Administrative and Operational Controls | 00:05:00 | ||
| Communication | 00:09:00 | ||
| Presentation of Findings | 00:03:00 | ||
| Post-Report Activities | 00:05:00 | ||
| Data Destruction Process | 00:02:00 | ||
| Section 11: Tools and Programming | |||
| Using Scripting in Pen Testing | 00:13:00 | ||
| Bash Scripting Basics | 00:15:00 | ||
| Bash Scripting Techniques | 00:10:00 | ||
| PowerShell Scripts | 00:04:00 | ||
| Ruby Scripts | 00:07:00 | ||
| Python Scripts | 00:06:00 | ||
| Scripting Languages Comparison | 00:11:00 | ||
| Data Structures, Part 1 | 00:08:00 | ||
| Data Structures, Part 2 | 00:08:00 | ||
| Libraries | 00:03:00 | ||
| Classes | 00:08:00 | ||
| Procedures and Functions | 00:06:00 | ||
| Perl and JavaScript | 00:06:00 | ||
| Section 12: Tools Inventory | |||
| Pen Testing Toolbox | 00:07:00 | ||
| Using Kali Linux | 00:06:00 | ||
| Scanners & Credential Tools | 00:10:00 | ||
| Code-Cracking Tools | 00:04:00 | ||
| Open-Source Research Tools | 00:06:00 | ||
| Wireless and Web Pen Testing Tools | 00:11:00 | ||
| Remote Access Tools | 00:06:00 | ||
| Analyzers and Mobile Pen Testing Tools | 00:02:00 | ||
| Other Pen Testing Tools | 00:04:00 | ||
| Labtainers Lab (Metasploit Framework) | 00:02:00 | ||
| Labtainers Lab (Wireshark Packet Inspection) | 00:02:00 | ||
| Labtainers Lab (SSH) | 00:01:00 | ||
| Scanners, Debuggers, and Wireless Tools | 00:10:00 | ||
| Web, Steganography, and Cloud Tools | 00:09:00 | ||
Instructors
18 STUDENTS ENROLLED
Food Hygiene
Health & Safety
Safeguarding
First Aid
Business Skills
Personal Development



