CompTIA PenTest+ Cert Guide (PT0-002)
The CompTIA Pentest+ Cert Guide exam measures a candidate’s ability to accomplish pen testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises.
- Price: $279.99
- Delivery Method: eLearning
Name | Buy |
---|---|
CompTIA PenTest+ Cert Guide (PT0-002) |
Test Prep
85+ Pre Assessment Questions |
2+ Full Length Tests |
85+ Post Assessment Questions |
170+ Practice Test Questions
Features
43+ LiveLab |
42+ Video tutorials |
01:34+ Hours
Performance-based and multiple choice
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction
- The Goals of the CompTIA PenTest+ Certification
- The Exam Objectives (Domains)
- Steps to Earning the PenTest+ Certification
- Facts About the PenTest+ Exam
- About the CompTIA PenTest+ PT0-002 Cert Guide
Lessons 2:
Introduction to Ethical Hacking and Penetration Testing
- Understanding Ethical Hacking and Penetration Testing
- Exploring Penetration Testing Methodologies
- Building Your Own Lab
- Review All Key Topics
Lessons 3:
Planning and Scoping a Penetration Testing Assessment
- Comparing and Contrasting Governance, Risk, and Compliance Concepts
- Explaining the Importance of Scoping and Organizational or Customer Requirements
- Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
- Review All Key Topics
Lessons 4:
Information Gathering and Vulnerability Scanning
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Understanding the Art of Performing Vulnerability Scans
- Understanding How to Analyze Vulnerability Scan Results
- Review All Key Topics
Lessons 5:
Social Engineering Attacks
- Pretexting for an Approach and Impersonation
- Social Engineering Attacks
- Physical Attacks
- Social Engineering Tools
- Methods of Influence
- Review All Key Topics
Lessons 6:
Exploiting Wired and Wireless Networks
- Exploiting Network-Based Vulnerabilities
- Exploiting Wireless Vulnerabilities
- Review All Key Topics
Lessons 7:
Exploiting Application-Based Vulnerabilities
- Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
- How to Build Your Own Web Application Lab
- Understanding Business Logic Flaws
- Understanding Injection-Based Vulnerabilities
- Exploiting Authentication-Based Vulnerabilities
- Exploiting Authorization-Based Vulnerabilities
- Understanding Cross-Site Scripting (XSS) Vulnerabilities
- Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
- Understanding Clickjacking
- Exploiting Security Misconfigurations
- Exploiting File Inclusion Vulnerabilities
- Exploiting Insecure Code Practices
- Review All Key Topics
Lessons 8:
Cloud, Mobile, and IoT Security
- Researching Attack Vectors and Performing Attacks on Cloud Technologies
- Explaining Common Attacks and Vulnerabilities Against Specialized Systems
- Review All Key Topics
Lessons 9:
Performing Post-Exploitation Techniques
- Creating a Foothold and Maintaining Persistence After Compromising a System
- Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
- Review All Key Topics
Lessons 10:
Reporting and Communication
- Comparing and Contrasting Important Components of Written Reports
- Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
- Explaining the Importance of Communication During the Penetration Testing Process
- Explaining Post-Report Delivery Activities
- Review All Key Topics
Lessons 11:
Tools and Code Analysis
- Understanding the Basic Concepts of Scripting and Software Development
- Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
- Review All Key Topics