- Explain the Importance of Planning for an Engagement.
4
- Explain Key Legal Concepts
5
- Passive Information Gathering, Reconnaissance and Enumeration
6
- Passive Information Gathering Tools
7
- Reconnaissance Tools
8
- Vulnerability Management
9
- Vulnerability Scan Tools
10
- Interpreting Vulnerabilities Reports
11
- Exploit Types
12
- Metasploitable and Exploits DBs
13
- The Metasploit Framework
14
- Network Exploits
15
- NetBIOS Exploits
16
- Wireless Exploits
17
- Some Network Exploitation Tools
18
- Social Engineering
19
- Social Engineering Toolkit
20
- Exploiting Applications
21
- Injection Tools
22
- Special Permission Bits in Linux
23
- Exploiting Windows Hashes and Kernel
24
- Exploiting Linux Kernels
25
- Scripting in Bash, Powershell, Python and Ruby
26
- Reporting and Monitoring
Description:
Embark on a comprehensive 11-hour journey through the world of penetration testing with this in-depth CompTIA PenTest+ course. Gain both theoretical knowledge and hands-on experience through follow-along labs covering essential topics such as planning and scoping, information gathering, vulnerability scanning and analysis, various exploit types, network and application exploitation, social engineering, and scripting. Master tools like Metasploit Framework, passive information gathering tools, and vulnerability scan tools. Explore crucial concepts including legal considerations, wireless exploits, and kernel exploitation in both Windows and Linux environments. Develop practical skills in scripting with Bash, PowerShell, Python, and Ruby. Conclude with insights on effective reporting and monitoring practices, preparing you thoroughly for the CompTIA PenTest+ PT0-002 exam and real-world penetration testing scenarios.