Course Highlights
The CompTIA PenTest+ Ethical Hacking Course is a comprehensive and up-to-date course that will teach you everything you need to know to become a professional penetration tester. Embark on an exhilarating journey into the world of cybersecurity with our “CompTIA PenTest+ Ethical Hacking Course.” In this immersive learning experience, you’ll explore six captivating sections that will equip you with the skills and knowledge of an ethical hacker. Begin with an introduction that sets the stage for your transformation into a cybersecurity expert. Delve into planning and scoping to understand the importance of meticulous preparation in ethical hacking endeavours.
As you progress, you’ll learn the art of surveying the target, identifying vulnerabilities, and assessing potential risks. Select your attack vector carefully and master the intricacies of using pen testing tools effectively. Finally, learn the art of clear and concise reporting and effective communication of your findings, essential skills for any ethical hacker.
Learning outcome
- Identify and exploit security vulnerabilities in computer systems and networks
- Plan and execute penetration tests
- Report on the results of penetration tests
- Comply with ethical hacking best practices
Course media
Why should I take this course?
- The demand for ethical hackers is growing rapidly.
- This course will teach you the skills you need to get a high-paying job in cybersecurity.
- This course is comprehensive and up-to-date.
- The course includes hands-on exercises that allow you to valuable your skills.
- The course is taught by experienced instructors who are passionate about ethical hacking.
Career Path
- Penetration Tester
- Security Analyst
- Network Security Engineer
- Security Consultant
- Security Architect
Requirements
- A basic understanding of computer networks and security
- A willingness to learn new skills
- A desire to protect organizations from cyberattacks
Course Curriculum
-
Introduction00:09:00
-
Planning a Pen Test00:09:00
-
Rules of Engagement00:11:00
-
Resources and Budget00:07:00
-
Impact and Constraints00:05:00
-
Support Resources00:13:00
-
Legal Groundwork00:12:00
-
Scope Considerations00:11:00
-
Project Strategy and Risk00:09:00
-
Lab Environment Setup00:23:00
-
Scope Vulnerabilities00:14:00
-
Compliance-Based Assessments00:05:00
-
Scanning and Enumeration00:05:00
-
Scanning Demo00:11:00
-
Packet Investigation00:08:00
-
Packet Inspection Demo00:06:00
-
Application and Open-Source Resources00:12:00
-
Vulnerability Scanning00:09:00
-
Vulnerability Scanning Demo00:17:00
-
Target Considerations00:16:00
-
Nmap Timing and Performance Options00:07:00
-
Prioritization of Vulnerabilities00:09:00
-
Common Attack Techniques00:12:00
-
Credential Attacks00:15:00
-
Weaknesses in Specialized Systems00:18:00
-
Remote Social Engineering00:07:00
-
Spear Phishing Demo00:10:00
-
In-Person Social Engineering00:12:00
-
Network-Based Exploits00:07:00
-
FTP Exploit Demo00:08:00
-
Man-in-the-middle Exploits00:07:00
-
Wireless Exploits00:14:00
-
Application Exploits, Part 100:06:00
-
SQL Injection Demo00:09:00
-
Application Exploits, Part 200:08:00
-
Application Exploits, Part 300:09:00
-
Cross-Site Scripting Demo00:07:00
-
Code Vulnerabilities00:17:00
-
Local Host Vulnerabilities00:05:00
-
Privilege Escalation (Linux)00:10:00
-
Privilege Escalation (Windows)00:06:00
-
Misc. Privilege Escalation00:08:00
-
Misc. Local Host Vulnerabilities00:08:00
-
Physical Security00:11:00
-
Post-Exploitation Techniques00:11:00
-
Persistence and Stealth00:11:00
-
Nmap Scoping & Output Options00:21:00
-
Pen Testing Toolbox00:07:00
-
Using Kali Linux00:06:00
-
Scanners & Credential Tools00:10:00
-
Code-Cracking Tools00:05:00
-
Open-Source Research Tools00:07:00
-
Wireless and Web Pen Testing Tools00:11:00
-
Remote Access Tools00:06:00
-
Analyzers and Mobile Pen Testing Tools00:03:00
-
Other Pen Testing Tools00:05:00
-
Using Scripting in Pen Testing00:13:00
-
Bash Scripting Basics00:15:00
-
Bash Scripting Techniques00:10:00
-
PowerShell Scripts00:04:00
-
Ruby Scripts00:07:00
-
Python Scripts00:06:00
-
Scripting Languages Comparison00:11:00
-
Writing Reports00:16:00
-
Post-Report Activities00:06:00
-
Mitigation Strategies00:05:00
-
Communication00:10:00
14-Day Money-Back Guarantee
-
Duration:10 hours, 48 minutes
-
Access:1 Year
-
Units:67
Want to get everything for £149
Take Lifetime Pack