cert

CompTIA PenTest+ (Ethical Hacking)

Overview The CompTIA PenTest+ (Ethical Hacking) course provides a thorough introduction to ethical hacking and penetration testing. This course equips …

CompTIA PenTest+ (Ethical Hacking)

CompTIA PenTest+ (Ethical Hacking)

Original price was: $417.25.Current price is: $35.30.

TAKE THIS COURSE

are
are
are
clender

1 Year Access

teacher

3 Students

durantion

14 hours, 49 minutes

Gift this course

CompTIA PenTest+ (Ethical Hacking) Overview

The CompTIA PenTest+ (Ethical Hacking) course provides a thorough introduction to ethical hacking and penetration testing. This course equips you with the essential skills needed to identify vulnerabilities, execute network-based attacks, and protect systems from potential threats. You will delve into various facets of ethical hacking, including planning, engagement, post-exploitation, and reporting. By focusing on practical application, you will learn to utilise industry-standard tools and techniques effectively. As a result, you will be well-prepared to tackle real-world security challenges and significantly enhance your organisation’s cybersecurity posture.

Learning Outcomes

  • Gain insights into planning and engagement strategies essential for conducting penetration tests.
  • Learn to perform comprehensive information gathering and vulnerability scanning to identify security weaknesses.
  • Develop skills to perform and defend against network-based attacks, understanding their impact on security.
  • Acquire knowledge on selecting and using various penetration testing tools for different scenarios.
  • Master the art of reporting and communicating penetration testing results to stakeholders effectively.
  • Learn techniques for attacking and securing cloud environments.
  • : Gain expertise in testing and securing specialised and fragile systems.
  • Understand social engineering tactics and physical attack strategies to identify potential security breaches.
  • Develop skills for analysing and mitigating threats post-exploitation.
  • Learn best practices for post-engagement activities to ensure comprehensive security assessments.

Who Is This Course For

This course targets IT professionals and cybersecurity enthusiasts who want to advance their skills in ethical hacking and penetration testing. It suits those eager to gain practical experience and certification in identifying and addressing security vulnerabilities. Whether you are a network administrator, security analyst, or aspiring ethical hacker, this course offers the knowledge and tools necessary to excel in the field of cybersecurity.

Eligibility Requirements

Participants should have a foundational understanding of network security and IT concepts. Familiarity with basic cybersecurity practices and an interest in ethical hacking are beneficial. Prior experience in cybersecurity or related fields is not mandatory but can enhance your learning experience.

Entry Requirements

  • Age Requirement: Applicants must be aged 16 or above, allowing both young learners and adults to engage in this educational pursuit.
  • Academic Background: There are no specific educational prerequisites, opening the door to individuals from diverse academic histories.
  • Language Proficiency: A good command of the English language is essential for comprehension and engagement with the course materials.
  • Numeracy Skills: Basic numeracy skills are required for understanding nutritional data and dietary planning.

Why Choose Us

  • Affordable, engaging & high-quality e-learning study materials;
  • Tutorial videos/materials from the industry-leading experts;
  • Study in a user-friendly, advanced online learning platform;
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognised accredited
  • Access to course content on mobile, tablet or desktop from anywhere, anytime;
  • The benefit of career advancement opportunities;
  • 24/7 student support via email.

Career Path

Upon completing the CompTIA PenTest+ (Ethical Hacking) course, you will be well-prepared for diverse roles in the cybersecurity field. This course paves the way to careers such as ethical hacker, penetration tester, security consultant, and network security engineer. With the skills and certification you acquire, you will confidently address complex security challenges and play a crucial role in safeguarding organisational assets from cyber threats.

 

 

Course Curriculum

Section 01: Planning and Engagement
Introduction to the CompTIA PenTest+ (PT0-002) Course 00:02:00
About the CompTIA PenTest+ (PT0-002) Exam 00:07:00
Planning a Pen Test 00:08:00
Rules of Engagement 00:10:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Service Provider Agreements 00:02:00
Standards and Methodologies, Part 1 00:07:00
Standards and Methodologies, Part 2 00:09:00
Environmental and Scoping Considerations 00:14:00
Ethical Mindset 00:06:00
Lab Environment Setup 00:18:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:13:00
Compliance-Based Assessments 00:04:00
Section 02: Information Gathering and Vulnerability Scanning
Scanning and Enumeration 00:04:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Labtainers Setup 00:12:00
Labtainers Lab (Wireshark) 00:09:00
Application and Open-Source Resources 00:12:00
Passive Reconnaissance 00:10:00
Active Reconnaissance 00:08:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:16:00
Labtainers Lab (Network Basics) 00:03:00
Labtainers Lab (Nmap Discovery) 00:03:00
Target Considerations 00:16:00
Analyzing Scan Output 00:05:00
Nmap Scoping and Output Options 00:21:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Automating Vulnerability Scans 00:04:00
Credential Attacks 00:15:00
00:00
Labtainers Lab (Secure Socket Layers) 00:07:00
Labtainers Lab (Routing Basics) 00:02:00
Section 03: Network-Based Attacks
Exploit Resources and Network Attacks 00:05:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Labtainers Lab (TCP/IP Attacks) 00:02:00
Labtainers Lab (ARP Spoof Attacks) 00:02:00
Labtainers Lab (Local DNS Attacks) 00:02:00
Labtainers Lab (MACs and Hash Functions) 00:01:00
Section 04: Selecting Pen Testing Tools
Wireless Exploits, Part 1 00:13:00
Wireless Exploits, Part 2 00:03:00
Antennas 00:04:00
Section 05: Reporting and Communication
OWASP Top 10 00:09:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Labtainers Lab (SQL Injection) 00:03:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Labtainers Lab (Cross-Site Scripting) 00:02:00
Labtainers Lab (Cross-Site Request Forgery) 00:01:00
Code Vulnerabilities 00:17:00
API Attacks and Attack Resources 00:06:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Section 06: Attacking the Cloud
Cloud Attacks, Part 1 00:05:00
Cloud Attacks, Part 2 00:05:00
Section 07: Specialized and Fragile Systems
Mobile Attacks 00:10:00
IoT Attacks 00:10:00
Data Storage and Management Interface Attacks 00:09:00
Virtual and Containerized Environment Attacks 00:08:00
Labtainers Lab (Industrial Control System) 00:02:00
Section 08: Social Engineering and Physical Attacks
Pretext for a Social Engineering Attack 00:03:00
Remote Social Engineering 00:06:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Physical Security 00:11:00
Section 09: Post-Exploitation
Post-Exploitation Techniques 00:11:00
Post-Exploitation Tools 00:03:00
Network Segmentation Testing 00:03:00
Persistence and Stealth 00:11:00
Detection Avoidance Techniques 00:06:00
Section 10: Post-Engagement Activities
Report Writing 00:15:00
Important Components of Written Reports 00:03:00
Mitigation Strategies 00:05:00
Technical and Physical Controls 00:04:00
Administrative and Operational Controls 00:05:00
Communication 00:09:00
Presentation of Findings 00:03:00
Post-Report Activities 00:05:00
Data Destruction Process 00:02:00
Section 11: Tools and Programming
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Data Structures, Part 1 00:08:00
Data Structures, Part 2 00:08:00
Libraries 00:03:00
Classes 00:08:00
Procedures and Functions 00:06:00
Perl and JavaScript 00:06:00
Section 12: Tools Inventory
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:06:00
Scanners & Credential Tools 00:10:00
Code-Cracking Tools 00:04:00
Open-Source Research Tools 00:06:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:02:00
Other Pen Testing Tools 00:04:00
Labtainers Lab (Metasploit Framework) 00:02:00
Labtainers Lab (Wireshark Packet Inspection) 00:12:00
Labtainers Lab (SSH) 00:01:00
Scanners, Debuggers, and Wireless Tools 00:10:00
Web, Steganography, and Cloud Tools 00:09:00

Course Ratings

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Ratings found for this course.

How Do Our Courses Work?

Purchase and payment

Add your chosen course to your basket. Once you’ve added all the courses you need.

Course access

Add your chosen course to your basket. Once you’ve added all the courses you need.

Certificate

Add your chosen course to your basket. Once you’ve added all the courses you need.

Continued support

Add your chosen course to your basket. Once you’ve added all the courses you need.

Dive into an enriching online learning journey with Alpha Academy. We pride ourselves on offering a diverse range of courses tailored to your needs. Elevate your expertise or discover a new passion. With Alpha Academy, your pursuit of knowledge has no bounds.

Contact

For Business

Certificate validator

Payment methods possible

© ALPHA ACADEMY IS A PART OF ADAMS ACADEMY INC. LTD.

top
0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Summer SALE :: ALL COURSES for Original price was: $652.69.Current price is: $64.09. / year

    ADD OFFER TO CART

    No more than 50 active courses at any one time. Membership renews after 12 months. Cancel anytime from your account. Certain courses are not included. Can't be used in conjunction with any other offer.

      Apply Coupon