CompTIA PenTest+ (Ethical Hacking)

4.9 (18 REVIEWS)
18 STUDENTS

GET THIS COURSE AND 2500+ OTHERS FOR ONLY £49 FIND OUT MORE

CompTIA PenTest+ (Ethical Hacking) Course teaches you everything on the topic thoroughly from scratch so you can achieve a professional certificate for free to showcase your achievement in professional life. This CompTIA PenTest+ (Ethical Hacking) Course is a comprehensive, instructor-guided course, designed to provide a detailed understanding of the nature of the related sector and your key roles within it.

To become successful in your profession, you must have a specific set of skills to succeed in today’s competitive world. In this in-depth training course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills.

The training materials of this course are available online for you to learn at your own pace and fast-track your career with ease.

Sneak Peek

Who should take the course

Anyone with a knack for learning new skills can take this CompTIA PenTest+ (Ethical Hacking) Course. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions.

Certification

Once you’ve successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). All of our courses are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

functional skills maths level 2

Accreditation

All of our courses, including this CompTIA PenTest+ (Ethical Hacking) Course, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field.

Course Curriculum

The detailed curriculum outline of our CompTIA PenTest+ (Ethical Hacking) Course is as follows:

Introduction

  • Introduction to the CompTIA PenTest+ (PT0-002) Course
  • About the CompTIA PenTest+ (PT0-002) Exam

Section 01: Planning and Engagement

  • Planning a Pen Test
  • Rules of Engagement
  • Regulatory Compliance
  • Resources and Budget
  • Impact and Constraints
  • Support Resources
  • Legal Groundwork
  • Service Provider Agreements
  • Standards and Methodologies, Part 1
  • Standards and Methodologies, Part 2
  • Environmental and Scoping Considerations
  • Ethical Mindset
  • Lab Environment Setup
  • Project Strategy and Risk
  • Scope Vulnerabilities
  • Compliance-Based Assessments

Section 02: Information Gathering and Vulnerability Scanning

  • Scanning and Enumeration
  • Scanning Demo
  • Packet Investigation
  • Packet Inspection Demo
  • Labtainers Setup
  • Labtainers Lab (Wireshark)
  • Application and Open-Source Resources
  • Passive Reconnaissance
  • Active Reconnaissance
  • Vulnerability Scanning
  • Vulnerability Scanning Demo
  • Labtainers Lab (Network Basics)
  • Labtainers Lab (Nmap Discovery)
  • Target Considerations
  • Analyzing Scan Output
  • Nmap Scoping and Output Options
  • Nmap Timing and Performance Options
  • Prioritization of Vulnerabilities
  • Common Attack Techniques
  • Automating Vulnerability Scans
  • Credential Attacks
  • Labtainers Lab (Password Cracking)
  • Labtainers Lab (Secure Socket Layers)
  • Labtainers Lab (Routing Basics)

Section 03: Network-Based Attacks

  • Exploit Resources and Network Attacks
  • Network-Based Exploits
  • FTP Exploit Demo
  • Man-in-the-middle Exploits
  • Labtainers Lab (TCP/IP Attacks)
  • Labtainers Lab (ARP Spoof Attacks)
  • Labtainers Lab (Local DNS Attacks)
  • Labtainers Lab (MACs and Hash Functions)

Section 04: Selecting Pen Testing Tools

  • Wireless Exploits
  • Wireless Exploits, Part 2
  • Antennas

Section 05: Reporting and Communication

  • OWASP Top 10
  • Application Exploits, Part 1
  • SQL Injection Demo
  • Labtainers Lab (SQL Injection)
  • Application Exploits, Part 2
  • Application Exploits, Part 3
  • Cross-Site Scripting Demo
  • Labtainers Lab (Cross-Site Scripting)
  • Labtainers Lab (Cross-Site Request Forgery)
  • Code Vulnerabilities
  • API Attacks and Attack Resources
  • Privilege Escalation (Linux)
  • Privilege Escalation (Windows)
  • Misc. Privilege Escalation
  • Misc. Local Host Vulnerabilities

Section 06: Attacking the Cloud

  • Cloud Attacks, Part 1
  • Cloud Attacks, Part 2

Section 07: Specialized and Fragile Systems

  • Mobile Attacks
  • IoT Attacks
  • Data Storage and Management Interface Attacks
  • Virtual and Containerized Environment Attacks
  • Labtainers Lab (Industrial Control System)

Section 08: Social Engineering and Physical Attacks

  • Pretext for a Social Engineering Attack
  • Remote Social Engineering
  • Spear Phishing Demo
  • In-Person Social Engineering
  • Physical Security

Section 09: Post-Exploitation

  • Post-Exploitation Techniques
  • Post-Exploitation Tools
  • Network Segmentation Testing
  • Persistence and Stealth
  • Detection Avoidance Techniques

Section 10: Post-Engagement Activities

  • Report Writing
  • Important Components of Written Reports
  • Mitigation Strategies
  • Technical and Physical Controls
  • Administrative and Operational Controls
  • Communication
  • Presentation of Findings
  • Post-Report Activities
  • Data Destruction Process

Section 11: Tools and Programming

  • Using Scripting in Pen Testing
  • Bash Scripting Basics
  • Bash Scripting Techniques
  • PowerShell Scripts
  • Ruby Scripts
  • Python Scripts
  • Scripting Languages Comparison
  • Data Structures, Part 1
  • Data Structures, Part 2
  • Libraries
  • Classes
  • Procedures and Functions
  • Perl and JavaScript

Section 12: Tools Inventory

  • Pen Testing Toolbox
  • Using Kali Linux
  • Scanners & Credential Tools
  • Code-Cracking Tools
  • Open-Source Research Tools
  • Wireless and Web Pen Testing Tools
  • Remote Access Tools
  • Analyzers and Mobile Pen Testing Tools
  • Other Pen Testing Tools
  • Labtainers Lab (Metasploit Framework)
  • Labtainers Lab (Wireshark Packet Inspection)
  • Labtainers Lab (SSH)
  • Scanners, Debuggers, and Wireless Tools
  • Web, Steganography, and Cloud Tools

Course Curriculum

Introduction
Introduction to the CompTIA PenTest+ (PT0-002) Course 00:02:00
About the CompTIA PenTest+ (PT0-002) Exam 00:07:00
Section 01: Planning and Engagement
Planning a Pen Test 00:08:00
Rules of Engagement 00:10:00
Regulatory Compliance 00:04:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Service Provider Agreements 00:02:00
Standards and Methodologies, Part 1 00:07:00
Standards and Methodologies, Part 2 00:09:00
Environmental and Scoping Considerations 00:14:00
Ethical Mindset 00:06:00
Lab Environment Setup 00:18:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:13:00
Compliance-Based Assessments 00:04:00
Section 02: Information Gathering and Vulnerability Scanning
Scanning and Enumeration 00:04:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Labtainers Setup 00:12:00
Labtainers Lab (Wireshark) 00:09:00
Application and Open-Source Resources 00:12:00
Passive Reconnaissance 00:10:00
Active Reconnaissance 00:08:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:16:00
Labtainers Lab (Network Basics) 00:03:00
Labtainers Lab (Nmap Discovery) 00:03:00
Target Considerations 00:16:00
Analyzing Scan Output 00:06:00
Nmap Scoping and Output Options 00:21:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Automating Vulnerability Scans 00:04:00
Credential Attacks 00:15:00
Labtainers Lab (Password Cracking) 00:02:00
Labtainers Lab (Secure Socket Layers) 00:03:00
Labtainers Lab (Routing Basics) 00:02:00
Section 03: Network-Based Attacks
Exploit Resources and Network Attacks 00:05:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Labtainers Lab (TCP/IP Attacks) 00:02:00
Labtainers Lab (ARP Spoof Attacks) 00:02:00
Labtainers Lab (Local DNS Attacks) 00:02:00
Labtainers Lab (MACs and Hash Functions) 00:01:00
Section 04: Selecting Pen Testing Tools
Wireless Exploits, Part 1 00:13:00
Wireless Exploits, Part 2 00:03:00
Antennas 00:04:00
Section 05: Reporting and Communication
OWASP Top 10 00:09:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Labtainers Lab (SQL Injection) 00:03:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Labtainers Lab (Cross-Site Scripting) 00:02:00
Labtainers Lab (Cross-Site Request Forgery) 00:01:00
Code Vulnerabilities 00:17:00
API Attacks and Attack Resources 00:06:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Section 06: Attacking the Cloud
Cloud Attacks, Part 1 00:05:00
Cloud Attacks, Part 2 00:05:00
Section 07: Specialized and Fragile Systems
Mobile Attacks 00:10:00
IoT Attacks 00:10:00
Data Storage and Management Interface Attacks 00:09:00
Virtual and Containerized Environment Attacks 00:08:00
Labtainers Lab (Industrial Control System) 00:02:00
Section 08: Social Engineering and Physical Attacks
Pretext for a Social Engineering Attack 00:03:00
Remote Social Engineering 00:06:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Physical Security 00:11:00
Section 09: Post-Exploitation
Post-Exploitation Techniques 00:11:00
Post-Exploitation Tools 00:03:00
Network Segmentation Testing 00:03:00
Persistence and Stealth 00:11:00
Detection Avoidance Techniques 00:06:00
Section 10: Post-Engagement Activities
Report Writing 00:15:00
Important Components of Written Reports 00:03:00
Mitigation Strategies 00:05:00
Technical and Physical Controls 00:04:00
Administrative and Operational Controls 00:05:00
Communication 00:09:00
Presentation of Findings 00:03:00
Post-Report Activities 00:05:00
Data Destruction Process 00:02:00
Section 11: Tools and Programming
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Data Structures, Part 1 00:08:00
Data Structures, Part 2 00:08:00
Libraries 00:03:00
Classes 00:08:00
Procedures and Functions 00:06:00
Perl and JavaScript 00:06:00
Section 12: Tools Inventory
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:06:00
Scanners & Credential Tools 00:10:00
Code-Cracking Tools 00:04:00
Open-Source Research Tools 00:06:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:02:00
Other Pen Testing Tools 00:04:00
Labtainers Lab (Metasploit Framework) 00:02:00
Labtainers Lab (Wireshark Packet Inspection) 00:02:00
Labtainers Lab (SSH) 00:01:00
Scanners, Debuggers, and Wireless Tools 00:10:00
Web, Steganography, and Cloud Tools 00:09:00
CompTIA PenTest+ (Ethical Hacking)
ex Vat

SAVE 84% - OFFER ENDS SOON

TAKE THIS COURSE
  • Original price was: £125.00.Current price is: £20.00. ex Vat
  • 1 year
  • Course Certificate
  • 14 hours, 42 minutes
  • Gift this course
£20 /Unit Price
Total:
£100.00
Quantity:

Buying more than one of the same courses?

  • 50% discount for orders of 10+ courses
  • 60% discount for orders of 50+ courses
  • 70% discount for orders of 100+ courses

Looking for a more personalised package?

contact us now
18 STUDENTS ENROLLED

 

0
    0
    Your Cart

    UPGRADE TO GET UNLIMITED ACCESS TO ALL COURSES FOR ONLY £49

    ADD OFFER TO CART

    Full access to all courses for 12 months, with unlimited free accredited certificates. This offer is available for a limited time only.

      Apply Coupon