Cademy logoCademy Marketplace

Course Images

CompTIA PenTest+ (Ethical Hacking)

CompTIA PenTest+ (Ethical Hacking)

By Apex Learning

5.0(1)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 10 hours 48 minutes

  • All levels

Description

Overview

This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic.

After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market.

So enrol in this course today to fast track your career ladder.

How will I get my certificate?

You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.

Who is This course for?

There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds.

Requirements

Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G.

There is no time limit for completing this course, it can be studied in your own time at your own pace.

Career Path

Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to-

  • Open doors of opportunities
  • Increase your adaptability
  • Keep you relevant
  • Boost confidence

And much more!

Course Curriculum

6 sections • 67 lectures • 10:48:00 total length

•Introduction: 00:09:00

•Planning a Pen Test: 00:09:00

•Rules of Engagement: 00:11:00

•Resources and Budget: 00:07:00

•Impact and Constraints: 00:05:00

•Support Resources: 00:13:00

•Legal Groundwork: 00:12:00

•Scope Considerations: 00:11:00

•Lab Environment Setup: 00:23:00

•Project Strategy and Risk: 00:09:00

•Scope Vulnerabilities: 00:14:00

•Compliance-Based Assessments: 00:05:00

•Scanning and Enumeration: 00:05:00

•Scanning Demo: 00:11:00

•Packet Investigation: 00:08:00

•Packet Inspection Demo: 00:06:00

•Application and Open-Source Resources: 00:12:00

•Vulnerability Scanning: 00:09:00

•Vulnerability Scanning Demo: 00:17:00

•Target Considerations: 00:16:00

•Nmap Timing and Performance Options: 00:07:00

•Prioritization of Vulnerabilities: 00:09:00

•Common Attack Techniques: 00:12:00

•Credential Attacks: 00:15:00

•Weaknesses in Specialized Systems: 00:18:00

•Remote Social Engineering: 00:07:00

•Spear Phishing Demo: 00:10:00

•In-Person Social Engineering: 00:12:00

•Network-Based Exploits: 00:07:00

•FTP Exploit Demo: 00:08:00

•Man-in-the-middle Exploits: 00:07:00

•Wireless Exploits: 00:14:00

•Application Exploits, Part 1: 00:06:00

•SQL Injection Demo: 00:09:00

•Application Exploits, Part 2: 00:08:00

•Application Exploits, Part 3: 00:09:00

•Cross-Site Scripting Demo: 00:07:00

•Code Vulnerabilities: 00:17:00

•Local Host Vulnerabilities: 00:05:00

•Privilege Escalation (Linux): 00:10:00

•Privilege Escalation (Windows): 00:06:00

•Misc. Privilege Escalation: 00:08:00

•Misc. Local Host Vulnerabilities: 00:08:00

•Physical Security: 00:11:00

•Post-Exploitation Techniques: 00:11:00

•Persistence and Stealth: 00:11:00

•Nmap Scoping & Output Options: 00:21:00

•Pen Testing Toolbox: 00:07:00

•Using Kali Linux: 00:06:00

•Scanners & Credential Tools: 00:10:00

•Code-Cracking Tools: 00:05:00

•Open-Source Research Tools: 00:07:00

•Wireless and Web Pen Testing Tools: 00:11:00

•Remote Access Tools: 00:06:00

•Analyzers and Mobile Pen Testing Tools: 00:03:00

•Other Pen Testing Tools: 00:05:00

•Using Scripting in Pen Testing: 00:13:00

•Bash Scripting Basics: 00:15:00

•Bash Scripting Techniques: 00:10:00

•PowerShell Scripts: 00:04:00

•Ruby Scripts: 00:07:00

•Python Scripts: 00:06:00

•Scripting Languages Comparison: 00:11:00

•Writing Reports: 00:16:00

•Post-Report Activities: 00:06:00

•Mitigation Strategies: 00:05:00

•Communication: 00:10:00

About The Provider

Apex Learning
Apex Learning
London
5.0(1)

At Apex Learning, we share the goal of millions of people to mak...

Read more about Apex Learning

Tags

Reviews