Companies Home Search Profile

CompTIA Pentest+ (PT0-002) Cert Prep: 3 Attacks and Exploits

Focused View

Michael Solomon

4:46:22

101 View
  • 01 - Exploit resources and network attacks.mp4
    04:37
  • 02 - Network-based exploits.mp4
    07:07
  • 03 - FTP exploit demo.mp4
    08:14
  • 04 - Man-in-the-middle exploits.mp4
    07:06
  • 05 - Labtainers lab TCPIP attacks.mp4
    02:09
  • 06 - Labtainers lab ARP spoof attack.mp4
    01:53
  • 07 - Labtainers lab Local DNS attacks.mp4
    01:47
  • 08 - Labtainers lab MACs and hash functions.mp4
    01:19
  • 01 - Wireless exploits, part 1.mp4
    13:17
  • 02 - Wireless exploits, part 2.mp4
    02:46
  • 03 - Antennas.mp4
    03:48
  • 01 - OWASP Top 10.mp4
    08:40
  • 02 - Application exploits, part 1.mp4
    05:34
  • 03 - SQL injection demo.mp4
    08:41
  • 04 - Labtainers lab SQL injection.mp4
    02:38
  • 05 - Application exploits, part 2.mp4
    08:02
  • 06 - Application exploits, part 3.mp4
    09:11
  • 07 - Cross-site scripting demo.mp4
    07:00
  • 08 - Labtainers lab Cross-site scripting.mp4
    01:36
  • 09 - Labtainers lab Cross-site request forgery.mp4
    01:14
  • 10 - Code vulnerabilities.mp4
    16:36
  • 11 - API attacks and attack resources.mp4
    06:28
  • 12 - Privilege escalation Linux.mp4
    09:37
  • 13 - Privilege escalation Windows.mp4
    06:09
  • 14 - Miscellaneous privilege escalation.mp4
    07:54
  • 15 - Miscellaneous local host vulnerabilities.mp4
    08:05
  • 01 - Cloud attacks, part 1.mp4
    04:50
  • 02 - Cloud attacks, part 2.mp4
    04:39
  • 01 - Mobile attacks.mp4
    10:25
  • 02 - IoT attacks.mp4
    10:18
  • 03 - Data storage and management interface attacks.mp4
    08:58
  • 04 - Virtual and containerized environment attacks.mp4
    07:31
  • 05 - Labtainers lab Industrial control system.mp4
    01:51
  • 01 - Pretext for a social engineering attack.mp4
    02:31
  • 02 - Remote social engineering.mp4
    06:10
  • 03 - Spear phishing demo.mp4
    10:09
  • 04 - In-person social engineering.mp4
    11:45
  • 05 - Physical security.mp4
    11:17
  • 01 - Post-exploitation techniques.mp4
    11:07
  • 02 - Post-exploitation tools.mp4
    03:22
  • 03 - Network segmentation testing.mp4
    03:00
  • 04 - Persistence and stealth.mp4
    10:45
  • 05 - Detection avoidance techniques.mp4
    06:16
  • Description


    A successful pen test requires planning, information gathering, and well-orchestrated execution. But how do you ensure that your attacks are effective when there are so many available options to choose from? In this course, instructor Michael Solomon helps you prepare for the third domain of the CompTIA PenTest+ (PT0-002) certification exam, walking you through the best practices for launching common attacks and exploits. Learn why having a large repository of exploit input information makes it easier to chain exploits together and carry out more sophisticated attacks. Along the way, get exam tips from Michael on pen testing tools, reporting and communication, network-based attacks, wireless and RF attacks, web and database attacks, attacking the cloud, specialized and fragile systems, social engineering, physical attacks, post-exploitation, and more.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Michael Solomon
    Michael Solomon
    Instructor's Courses
    Michael Solomon is a security speaker, consultant, trainer, and project manager. Michael specializes in development and assessment security topics. An IT professional and consultant since 1987, Michael has worked on projects or trained for more than 60 major companies and organizations. As a project manager, Michael has led software projects with EarthLink, Schumacher, Nike, as well as content development and training projects with LearnKey. As an author, Michael has contributed to various security certification books with LANWrights/iLearning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 43
    • duration 4:46:22
    • Release Date 2023/09/21

    Courses related to CompTIA Pentest+