CompTIA PenTest+ (Ethical Hacking)

Overview The CompTIA PenTest+ (Ethical Hacking) course offers a complete overview of intelligence testing methods, strategies, and resources. This course …

Cloud Computing
  • newClaender 1 Year Access
  • level
  • students 6 Students
  • course_duration 14 hours, 49 minutes

CompTIA PenTest+ (Ethical Hacking)

Cloud Computing

Original price was: $417.25.Current price is: $35.30.

Save Up To 92% - Offer Ends In

TAKE THIS COURSE

Or ALL COURSES FOR £49
are
are
are
Gift this course
GET THIS COURSE AND 2500+ OTHERS FOR ONLY £49 PER YEAR. FIND OUT MORE

CompTIA PenTest+ (Ethical Hacking) Overview

The CompTIA PenTest+ (Ethical Hacking) course offers a complete overview of intelligence testing methods, strategies, and resources. This course gives students the skills they need to recognize, exploit, and report vulnerabilities ethically by covering important topics like planning, sensitivity, assessment, network attacks, cloud security, and reporting. Participants will gain practical experience in ethical hacking through dynamic labs and real-world scenarios, assisting organizations in building their security posture and following industry requirements.

Learning Outcomes

  • Plan and execute ethical penetration tests within defined scopes and constraints.
  • Analyse legal and compliance requirements for ethical hacking.
  • Conduct active and passive surveillance on various systems and networks.
  • Perform network-based assaults and show off your exploiting skills.
  • Execute network-based attacks and demonstrate exploit techniques.
  • Find and take advantage of program flaws such as cross-site scripting and SQL injection.
  • Create and utilize unique Python, PowerShell, Ruby, and Bash automation scripts.
  • Test cloud, mobile, IoT, and containerized environments for security gaps.
  • Apply social engineering tactics and physical attack techniques effectively.
  • Write detailed penetration test reports, including mitigation strategies and recommendations.

Who Is This Course For

The program is appropriate for IT professionals, security researchers, and ethical hackers aiming to improve their vulnerability testing abilities. The program caters to individuals who are preparing for the CompTIA PenTest+ (PT0-002) certification or seeking to deepen their understanding of ethical hacking, vulnerability management, and cybersecurity regulations.Anyone interested in protecting organisations from cyber threats will find this course valuable. 

Eligibility Requirements

Participants in this course should be familiar with the fundamentals of networking and cybersecurity. It is advised to be familiar with operating systems, such as Windows and Linux.Prior experience in IT or security roles is beneficial but not mandatory.

Entry Requirements

  • Age Requirement: Applicants must be aged 16 or above, allowing both young learners and adults to engage in this educational pursuit.
  • Academic Background: There are no specific educational prerequisites, opening the door to individuals from diverse academic histories.
  • Language Proficiency: A good command of the English language is essential for comprehension and engagement with the course materials.
  • Numeracy Skills: Basic numeracy skills are required to effectively understand and work with course-related information. 

Why Choose Us

  • Affordable, engaging & high-quality e-learning study materials;
  • Tutorial videos/materials from the industry-leading experts;
  • Study in a user-friendly, advanced online learning platform;
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognised accredited
  • Access to course content on mobile, tablet or desktop from anywhere, anytime;
  • The benefit of career advancement opportunities;
  • 24/7 student support via email.

Career Path

After finishing this course, you can pursue a variety of cybersecurity-related occupations. Students can pursue careers as penetration testers, ethical hackers, or security consultants. The acquired abilities might also benefit roles in vulnerability management, security audits, and compliance. Given the increasing need for cybersecurity specialists, this course offers a strong basis for career advancement and certifications that improve opportunities.

Course Curriculum

Section 01: Planning and Engagement
Introduction to the CompTIA PenTest+ (PT0-002) Course 00:02:00
About the CompTIA PenTest+ (PT0-002) Exam 00:07:00
Planning a Pen Test 00:08:00
Rules of Engagement 00:10:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Service Provider Agreements 00:02:00
Standards and Methodologies, Part 1 00:07:00
Standards and Methodologies, Part 2 00:09:00
Environmental and Scoping Considerations 00:14:00
Ethical Mindset 00:06:00
Lab Environment Setup 00:18:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:13:00
Compliance-Based Assessments 00:04:00
Section 02: Information Gathering and Vulnerability Scanning
Scanning and Enumeration 00:04:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Labtainers Setup 00:12:00
Labtainers Lab (Wireshark) 00:09:00
Application and Open-Source Resources 00:12:00
Passive Reconnaissance 00:10:00
Active Reconnaissance 00:08:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:16:00
Labtainers Lab (Network Basics) 00:03:00
Labtainers Lab (Nmap Discovery) 00:03:00
Target Considerations 00:16:00
Analyzing Scan Output 00:05:00
Nmap Scoping and Output Options 00:21:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Automating Vulnerability Scans 00:04:00
Credential Attacks 00:15:00
Labtainers Lab (Secure Socket Layers) 00:07:00
Labtainers Lab (Routing Basics) 00:02:00
Section 03: Network-Based Attacks
Exploit Resources and Network Attacks 00:05:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Labtainers Lab (TCP/IP Attacks) 00:02:00
Labtainers Lab (ARP Spoof Attacks) 00:02:00
Labtainers Lab (Local DNS Attacks) 00:02:00
Labtainers Lab (MACs and Hash Functions) 00:01:00
Section 04: Selecting Pen Testing Tools
Wireless Exploits, Part 1 00:13:00
Wireless Exploits, Part 2 00:03:00
Antennas 00:04:00
Section 05: Reporting and Communication
OWASP Top 10 00:09:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Labtainers Lab (SQL Injection) 00:03:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Labtainers Lab (Cross-Site Scripting) 00:02:00
Labtainers Lab (Cross-Site Request Forgery) 00:01:00
Code Vulnerabilities 00:17:00
API Attacks and Attack Resources 00:06:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Section 06: Attacking the Cloud
Cloud Attacks, Part 1 00:05:00
Cloud Attacks, Part 2 00:05:00
Section 07: Specialized and Fragile Systems
Mobile Attacks 00:10:00
IoT Attacks 00:10:00
Data Storage and Management Interface Attacks 00:09:00
Virtual and Containerized Environment Attacks 00:08:00
Labtainers Lab (Industrial Control System) 00:02:00
Section 08: Social Engineering and Physical Attacks
Pretext for a Social Engineering Attack 00:03:00
Remote Social Engineering 00:06:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Physical Security 00:11:00
Section 09: Post-Exploitation
Post-Exploitation Techniques 00:11:00
Post-Exploitation Tools 00:03:00
Network Segmentation Testing 00:03:00
Persistence and Stealth 00:11:00
Detection Avoidance Techniques 00:06:00
Section 10: Post-Engagement Activities
Report Writing 00:15:00
Important Components of Written Reports 00:03:00
Mitigation Strategies 00:05:00
Technical and Physical Controls 00:04:00
Administrative and Operational Controls 00:05:00
Communication 00:09:00
Presentation of Findings 00:03:00
Post-Report Activities 00:05:00
Data Destruction Process 00:02:00
Section 11: Tools and Programming
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Data Structures, Part 1 00:08:00
Data Structures, Part 2 00:08:00
Libraries 00:03:00
Classes 00:08:00
Procedures and Functions 00:06:00
Perl and JavaScript 00:06:00
Section 12: Tools Inventory
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:06:00
Scanners & Credential Tools 00:10:00
Code-Cracking Tools 00:04:00
Open-Source Research Tools 00:06:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:02:00
Other Pen Testing Tools 00:04:00
Labtainers Lab (Metasploit Framework) 00:02:00
Labtainers Lab (Wireshark Packet Inspection) 00:12:00
Labtainers Lab (SSH) 00:01:00
Scanners, Debuggers, and Wireless Tools 00:10:00
Web, Steganography, and Cloud Tools 00:09:00
Order Certificate
Order Certificate 00:00:00

How Do Our Courses Work?

Purchase and payment

Secure your course with an easy one-time payment and get instant access.

Course access

Enjoy 1-year unlimited access to study at your own pace, anytime, anywhere.

Certificate

Complete the course and order your accredited certificate to showcase your achievement.

Continued support

Get 24/7 expert support to assist you throughout your learning journey.

Dive into an enriching online learning journey with Alpha Academy. We pride ourselves on offering a diverse range of courses tailored to your needs. Elevate your expertise or discover a new passion. With Alpha Academy, your pursuit of knowledge has no bounds.

Contact

For Business

Certificate validator

Payment methods possible

© ALPHA ACADEMY IS A PART OF ADAMS ACADEMY INC. LTD.

top
0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    SPRING SALE – Get 2500+ COURSES FOR Original price was: $652.69.Current price is: $64.09. / year

    ADD OFFER TO CART-

    No more than 50 active courses at any one time. Membership renews after 12 months. Cancel anytime from your account. Certain courses are not included. Can't be used in conjunction with any other offer.

      Apply Coupon
        ×