Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
South Africa 1684

You are here

CompTIA PenTest PT0-001


CompTIA PenTest PT0-001

Interactive and entertaining talk-show style format presented by industry leading experts.

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings. Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security. CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

Instructor: Chrys Thorsen

  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results

Although not a prerequisite the CompTIA PenTest+ (PT0-001) Certification is aimed at an IT security professional who has:

  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience
Target Audience

This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management

Module 1 - The Pen Test Engagement

1.0 PenTest Plus Introduction

1.1 PenTest Plus Topics

1.2 PenTest Engagement

1.3 Threat Modeling

1.4 Technical Constraints

1.5 PenTest Engagement Review

1.6 Examining PenTest Engagement Documents Act

Module 2 - Passive Reconnaissance

2.1 Passive Reconnaissance part1

2.2 WHOIS Act

2.3 Passive Reconnaissance part2

2.4 Google Hacking Act

2.5 Passive Reconnaissance part3

2.6 DNS Querying Act

2.7 Passive Reconnaissance part4

2.8 Email Server Querying Act

2.9 SSL-TLS Cerfificates

2.10 Shodan Act

2.11 The Havester

2.12 TheHarvester Act

2.13 Recon-ng

2.14 Recon-g Act

2.14 Recon-ng-Part-2-API-key Act

2.15 Maltego

2.16 Have I been Pwned

2.17 Punked and Owned Pwned Act

2.18 Fingerprinting Organization with Collected Archives

2.19 FOCA Act

2.20 Findings Analysis Weaponization

2.21 Chp 2 Review

Module 3 - Active Reconnaissance

3.1 Active Reconnaissannce

3.2 Discovery Scans Act

3.3 Nmap

3.4 Nmap Scans Types Act

3.5 Nmap Options

3.6 Nmap Options Act

3.7 Stealth Scans

3.8 Nmap Stealth Scans Act

3.9 Full Scans

3.10 Full Scans Act

3.11 Packet Crafting

3.12 Packet Crafting Act

3.13 Network Mapping

3.14 Metasploit

3.15 Scanning with Metasploit Act

3.16 Enumeration

3.17 Banner Grabbing Act

3.18 Windows Host Enumeration

3.19 Winddows Host Enumeration Act

3.20 Linux Host Enumeration

3.21 Linux Host Enumeration Act

3.22 Service Enumeration

3.23 Service Enumeration Act

3.24 Network Shares

3.25 SMB Share Enumeration Act

3.26 NFS Network Share Enumeration

3.27 NFS Share Enumeration Act

3.28 Null Sessions

3.29 Null Sessions Act

3.30 Website Enumeration

3.31 Website Enumeration Act

3.32 Vulnerability Scans

3.33 Compliance Scans Act

3.34 Credentialed Non-credentialed Scans

3.35 Using Credentials in Scans Act

3.36 Server Service Vulnerability Scan

3.37 Vulnerability Scanning Act

3.38 Web Server Database Vulnerability Scan

3.39 SQL Vulnerability Scanning Act

3.40 Vulnerability Scan Part 2 OpenVAS Act

3.41 Web App Vulnerability Scan

3.42 Web App Vulnerability Scanning Act

3.43 Network Device Vulnerability Scan

3.44 Network Device Vuln Scanning Act

3.45 Nmap Scripts

3.46 Using Nmap Scripts for Vuln Scanning Act

3.47 Packet Crafting for Vulnerbility Scans

3.48 Firewall Vulnerability Scans

3.49 Wireless Access Point Vunerability

3.50 Wireless AP Scans Act

3.51 WAP Vulnerability Scans

3.52 Container Security issues

3.53 How to Update Metasploit Pro Expired Trial License

Module 4 - Physical Security

4.1 Physical Security

4.2 Badge Cloning Act

4.3 Physical Security Review

Module 5 - Social Engineering

5.1 Social Engineering

5.2 Using Baited USB Stick Act

5.3 Using Social Enginnering to Assist Attacks

5.4 Phishing Act

5.5 Social Engineering Review

Module 6 - Vulnerability Scan Analysis

6.1 Vulnerbility Scan Analysis

6.2 Validating Vulnerability Scan Results Act

6.3 Vulnerbility Scan Analysis Review

Module 7 - Password Cracking

7.1 Password Cracking

7.2 Brute Force Attack Against Network Service Act

7.3 Network Authentication Interception Attack

7.4 Intercepting Network Authentication Act

7.5 Pass the Hash Attacks

7.6 Pass the Hash Act

7.7 Password Cracking Review

Module 8 - Penetrating Wired Networks

8.1 Penetrating Wired Network

8.2 Sniffing Act

8.3 Eavesdropping

8.4 Eavesdropping Act

8.5 ARP Poisoning

8.6 ARP Poisoning Act

8.7 Man In The Middle

8.8 MITM Act

8.9 TCP Session HiJacking

8.10 Server Message Blocks SMB Exploits

8.11 SMB Attack Act

8.12 Web Server Attacks

8.13 FTP Attacks

8.14 Telnet Server Attacks

8.15 SSH Server Attacks

8.16 Simple Network Mgmt Protocol SNMP

8.17 Simple Mail Transfer Protocol SMTP

8.18 Domain Name System DNS Cache Poisoning

8.19 Denail of Service Attack DoS-DDoS

8.20 DoS Attack Act

8.21 VLAN Hopping Review

Module 9 - Penetrating Wireless Networks

9.1 Penetrating Wireless Networks

9.2 Jamming Act

9.3 Wireless Sniffing

9.4 Replay Attacks

9.5 WEP Cracking Act

9.6 WPA-WPA2 Cracking

9.7 WAP Cracking Act

9.8 Evil Twin Attacks

9.9 Evil Twin Attack Act

9.10 WiFi Protected Setup

9.11 Bluetooth Attacks

9.12 Penetrating Wireless Networks

Module 10 - Windows Exploits

10.1 Windows Exploits

10.2 Dumping Stored Passwords Act

10.3 Dictionary Attacks

10.4 Dictionary Attack Against Windows Act

10.5 Rainbow Table Attacks

10.6 Credential Brute Force Attacks

10.7 Keylogging Attack Act

10.8 Windows Kernel

10.9 Kernel Attack Act

10.10 Windows Components

10.11 Memory Vulnerabilities

10.12 Buffer Overflow Attack Act

10.13 Privilegde Escalation in Windows

10.14 Windows Accounts

10.15 Net and WMIC Commands

10.16 Sandboxes

Module 11 - Linux Exploits

11.1 Linux Exploits

11.2 Exploiting Common Linux Features Act

11.3 Password Cracking in Linux

11.4 Cracking Linux Passwords Act

11.5 Vulnerability Linux

11.6 Priviledge Escalation Linux

11.7 Linux Accounts

11.8 Linux Exploits Review

Module 12 - Mobile Devices

12.1 Mobile Devices

12.2 Hacking Android Act

12.3 Apple Exploits

12.4 Moblie Devices Review

Module 13 - Specialized Systems

13.1 Specialized Systems

13.2 Specialized Systems Review

Module 14 - Scripts

14.1 Scripts

14.2 Powershell

14.3 Python

14.4 Ruby

14.5 Common Scripting Elements

14.6 Scripts Review

14.7 Better Ping Sweep

14.8 Simple Port Scanner2

14.9 Multitarget Port Scanner

14.10 Port Scanner with Nmap

14.11 Scripts Review

Module 15 - Application Testing

15.1 Application Testing

15.2 Reverse Engineering

Module 16 - Web App Exploits

16.1 Webb App Exploits

16.2 Injection Attacks

16.3 HTML Injection

16.4 SQL Hacking - SQLmap Act

16.5 Cross-Site Attacks

16.6 Cross-Site Request Forgery

16.7 Other Web-based Attacks

16.8 File Inclusion Attacks

16.9 Web Shells

16.10 Web Shells Review

Module 17 - Lateral Movement

17.1 Lateral Movement

17.2 Lateral Movement with Remote Mgmt Services

17.3 Process Migration Act

17.4 Passing Control Act

17.5 Pivoting

17.6 Tools the Enable Pivoting

17.7 Lateral Movement Review

Module 18 - Persistence

18.1 Persistence

18.2 Breeding RATS Act

18.3 Bind and Reverse Shells

18.4 Bind Shells Act

18.5 Reverse Shells

18.6 Reverse Shells Act

18.7 Netcat

18.8 Netcat Act

18.9 Scheduled Tasks

18.10 Scheduled Tasks Act

18.11 Services and Domains

18.12 Persistence Review

Module 19 - Cover Your Tracks

19.1 Cover Your Tracks

19.2 Cover Your Tracks - Timestomp Files Act

19.3 Cover Your Tracks - Frame the Administrator Act

19.4 Cover Your Tracks - Clear the Event Log Act

19.5 Cover Your Tracks Review

Module 20 - The Report

20.1 The Report

20.2 The Report Review

Module 21 - Post Engagement Cleanup

21.1 Post Engagement Cleanup

21.1 Post Engagement Cleanup_1

21.3 Post Engagement Cleanup Review

21.4 PenTest Plus Conclusion.mp4

?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 26:00:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top