Companies Home Search Profile

Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+

Focused View

Matthew Lloyd Davies

2:38:47

74 View
  • 1. CERT TRAILER.mp4
    01:36
  • 1. Exploring Cloud Deployment and Service Models.mp4
    06:08
  • 2. How is Cloud Penetration Testing Different-.mp4
    06:18
  • 3. A Real-world Example.mp4
    01:48
  • 4. Legal Aspects and Permissions.mp4
    03:02
  • 5. Top 10 Cloud Vulnerabilities.mp4
    06:36
  • 6. Software Development Kits.mp4
    04:24
  • 7. Exam Essentials.mp4
    02:31
  • 1. Attacking Mobile Devices.mp4
    05:44
  • 2. Demo- Static Analysis of Android Application Packages.mp4
    07:00
  • 3. Devices that Interact with the Physical World.mp4
    05:41
  • 4. Industrial Control Systems.mp4
    09:05
  • 5. Vulnerabilities in Virtualization and Containerization.mp4
    06:34
  • 6. Vulnerabilities in Data Storage Systems.mp4
    06:16
  • 7. Exam Essentials.mp4
    03:46
  • 1. Social Engineering.mp4
    04:20
  • 2. In-person Social Engineering Attacks.mp4
    03:53
  • 3. Digital Social Engineering Attacks.mp4
    05:08
  • 4. Social Engineering Tools.mp4
    02:41
  • 5. Demo- USB Key Drop Attack.mp4
    02:41
  • 6. Demo- Hooking Browsers with BeEF.mp4
    04:17
  • 7. Physical Attacks.mp4
    05:01
  • 8. Exam Essentials.mp4
    03:26
  • 01. Post-exploitation in Context.mp4
    04:43
  • 02. Demo- PowerShell Empire.mp4
    02:50
  • 03. Enumeration.mp4
    02:00
  • 04. Enumeration Living off the LAN.mp4
    03:43
  • 05. Lateral Movement, Pivoting, and Privilege Escalation.mp4
    06:22
  • 06. Demo- Lateral Movement with Pass-the-hash.mp4
    03:18
  • 07. Persistence.mp4
    04:49
  • 08. Demo- Maintaining Persistence on Windows.mp4
    03:18
  • 09. Avoiding Detection.mp4
    03:45
  • 10. Demo- Avoiding Detection.mp4
    06:32
  • 11. Exam Essentials.mp4
    04:06
  • 1. Domain Summary.mp4
    05:25
  • Description


    In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.

    What You'll Learn?


      If you're preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Matthew Lloyd Davies
    Matthew Lloyd Davies
    Instructor's Courses
    With a background in Chemical Engineering and a career meandering through explosives safety research and accident investigation, Matt is now a Principal inspector and Deputy Professional Lead for Cyber Security and Information Assurance at the Office for Nuclear Regulation in the UK. For 11 years he has regulated nuclear safety and nuclear security across the whole of the UK’s nuclear estate and is currently responsible for regulating cyber security and information assurance across various parts of the nuclear fuel cycle. He is also responsible for developing ONR’s CS&IA regulatory capacity and capability and, as a GIAC certified penetration tester and incident handler, is the lead for technical assurance activities. Matt has planned and run national cyber security exercises that have simulated cyber-attacks against industrial control systems and has run projects to develop new and novel techniques for conducting assurance activities against industrial control systems.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 35
    • duration 2:38:47
    • level average
    • Release Date 2023/01/24