Video training course for the CompTIA PenTest+ Exam. This course part theory and part practical and prepares you for the latest PenTest+ PT0-001 exam. The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.
CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011. It's the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them.
PenTest+ is unique because the certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
Diogo is an assistant professor in the School of Information at the Florida State University, focusing his research on network performance, cybersecurity, disaster recovery techniques for large-scale networks, software-defined networking (SDN) and network function virtualization (NFV). Additionally, he has more than 15 years of industry experience in network and Linux engineering.
He received a Ph.D. degree in electrical engineering from the University of South Florida, Tampa, FL, and a M.S. degree in computer engineering from the Federal University of Goias, Brazil. Both his masters and PhD research topics focused on network performance and security.
|Unit 1||The CompTIA Pentest+ Exam|
|Module 2||Planning and Scoping|
|Unit 1||Explain the Importance of Planning for an Engagement.|
|Unit 2||Explain Key Legal Concepts|
|Module 3||Information Gathering|
|Unit 1||Passive Information Gathering, Reconnaissance and Enumeration|
|Unit 2||Passive Information Gathering Tools|
|Unit 3||Reconnaissance Tools|
|Module 4||Vulnerability Scanning|
|Unit 1||Vulnerability Management|
|Unit 2||Vulnerability Scan Tools|
|Module 5||Vulnerability Analysis|
|Unit 1||Interpreting Vulnerabilities Reports|
|Unit 1||Exploit Types|
|Unit 2||Metasploitable and Exploits DBs|
|Unit 3||The Metasploit Framework|
|Module 7||Exploiting Networks|
|Unit 1||Network Exploits|
|Unit 2||NetBIOS Exploits|
|Unit 3||Wireless Exploits|
|Unit 4||Some Network Exploitation Tools|
|Module 8||Exploiting People|
|Unit 1||Social Engineering|
|Unit 2||Social Engineering Toolkit|
|Module 9||Exploiting Applications|
|Unit 1||Exploiting Applications|
|Unit 2||Injection Tools|
|Module 10||Exploiting Hosts|
|Unit 1||Special Permission Bits in Linux|
|Unit 2||Exploiting Windows Hashes and Kernel|
|Unit 3||Exploiting Linux Kernels|
|Module 11||Using and Writing Pentesting Scripts|
|Unit 1||Scripting in Bash, Powershell, Python and Ruby|
|Unit 1||Reporting and Monitoring|
|Unit 1||Exam 1|