Companies Home Search Profile

CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab

Focused View

Oak Academy,OAK Academy Team

28:03:45

4 View
  • 1 - Requirements and Overview of Lab.mp4
    03:54
  • 2 - Installing VMware Workstation Player.mp4
    07:32
  • 3 - FAQ about CompTIA Pentest PT0002 Ethical Hacking Pentesting.html
  • 4 - Virtualbox Download and Install.mp4
    05:02
  • 5 - Installing Kali using the ISO file for VMware Step 1.mp4
    01:26
  • 6 - Installing Kali using the ISO file for VMware Step 2.mp4
    06:48
  • 7 - Installing Kali using the ISO file for VMware Step 3.mp4
    02:41
  • 8 - Installing Kali on VirtualBox using the OVA file Step 1.mp4
    03:14
  • 9 - Installing Kali on VirtualBox using the OVA file Step 2.mp4
    06:44
  • 10 - Installing Kali on VirtualBox using the OVA file Step 3.mp4
    04:11
  • 11 - Installing Metasploitable 2.mp4
    03:43
  • 12 - Installing Metasploitable 3 VM Creation with Vagrant.mp4
    06:21
  • 13 - Downloading and Installing Free Windows 7 and Windows 10.mp4
    02:58
  • 14 - Installing Vulnerable Virtual Machine BeeBox.mp4
    08:03
  • 15 - Nat Network Create and Settings.mp4
    03:15
  • 16 - Connection Test.mp4
    06:36
  • 17 - Content of the Penetration Testing.mp4
    02:34
  • 18 - Definition of Penetration Test.mp4
    02:13
  • 19 - Penetration Test Types.mp4
    00:28
  • 20 - Security Audits.mp4
    04:41
  • 21 - Vulnerability Scan.mp4
    02:45
  • 22 - Terms Asset Threat Vulnerability Risk Exploit.mp4
    03:08
  • 23 - Penetration Test Approaches.mp4
    02:44
  • 24 - Planning a Penetration Test.mp4
    04:24
  • 25 - Penetration Test Phases.mp4
    07:00
  • 26 - Legal Issues & Testing Standards.mp4
    04:18
  • 27 - What is Protocol.mp4
    05:36
  • 28 - Reference Models.mp4
    00:24
  • 29 - OSI Reference Model.mp4
    13:43
  • 30 - OSI vs TCPIP.mp4
    02:33
  • 31 - Demonstration using Wireshark.mp4
    07:59
  • 32 - Standards & Protocols.mp4
    03:50
  • 33 - Ethernet Principles Frame & Headers.mp4
    04:06
  • 34 - ARP Address Resolution Protocol Mechanism ARP Tables ARP Packets.mp4
    06:10
  • 35 - ARP HandOn Practices.mp4
    03:14
  • 36 - VLANs Virtual Local Area Networks.mp4
    04:03
  • 37 - WLANs Wireless Local Area Networks.mp4
    07:01
  • 38 - Introduction to Network Layer.mp4
    01:37
  • 39 - Internet Protocol IP.mp4
    02:49
  • 40 - IPv4 Adressing System.mp4
    01:56
  • 41 - IPv4 Packet Header.mp4
    02:56
  • 42 - IPv4 Subnetting Classful Networks.mp4
    02:35
  • 43 - IPv4 Subnetting Subnet Mask.mp4
    02:59
  • 44 - IPv4 Subnetting Understanding.mp4
    03:09
  • 45 - IPv4 Shortage.mp4
    01:41
  • 46 - Private Networks.mp4
    03:59
  • 47 - Private Networks Demonstration.mp4
    03:01
  • 48 - NAT Network Address Translation.mp4
    04:30
  • 49 - IPv6 Packet Header & Addressing.mp4
    08:30
  • 50 - DHCP How the Mechanism Works.mp4
    09:23
  • 51 - ICMP Internet Control Message Protocol.mp4
    02:02
  • 52 - Traceroute.mp4
    09:51
  • 53 - Introduction to Transport Layer.mp4
    02:40
  • 54 - TCP Transmission Control Protocol.mp4
    06:59
  • 55 - TCP Header.mp4
    02:27
  • 56 - UDP User Datagram Protocol.mp4
    03:56
  • 57 - Introduction to Application Layer.mp4
    00:55
  • 58 - DNS Domain Name System.mp4
    05:56
  • 59 - HTTP Hyper Text Transfer Protocol.mp4
    03:09
  • 60 - HTTPS.mp4
    01:56
  • 61 - Intro to Reconnaissance.mp4
    03:31
  • 62 - Extract Domain Registration Information Whois.mp4
    04:19
  • 63 - Identifying Hosts or Subdomains Using DNS Fierce & Theharvester.mp4
    06:07
  • 64 - Detect Applications on The Same Service.mp4
    01:09
  • 65 - Ports and Services on The Web Server.mp4
    08:44
  • 66 - Review TechnologyArchitecture Information.mp4
    04:36
  • 67 - Extracting Directory Structure Crawling.mp4
    08:16
  • 68 - Minimum Information Principle.mp4
    02:55
  • 69 - Using Search Engines Google Hacking.mp4
    06:10
  • 70 - Shodan.mp4
    02:50
  • 71 - Web Archives.mp4
    01:53
  • 72 - FOCA Fingerprinting Organisations with Collected Archives.mp4
    07:41
  • 73 - Maltego Visual Link Analysis Tool.mp4
    04:38
  • 74 - Introduction to Vulnerability Scan.mp4
    09:19
  • 75 - Introduction to Nessus.mp4
    01:57
  • 76 - Nessus Download.mp4
    01:40
  • 77 - Nessus Install & Setup.mp4
    03:42
  • 78 - Nessus Creating a Custom Policy.mp4
    05:39
  • 79 - Nessus First Scan.mp4
    07:07
  • 80 - An Aggressive Scan.mp4
    04:23
  • 81 - Results of an Aggressive Scan.mp4
    07:17
  • 82 - Results of an Aggressive Scan with Windows Systems.mp4
    02:45
  • 83 - Nessus Report Function.mp4
    02:21
  • 84 - Passive Scan Definition.mp4
    02:50
  • 85 - Passive Scan ARP Tables.mp4
    06:20
  • 86 - Passive Scan Wireshark.mp4
    06:36
  • 87 - Wireshark Following Stream.mp4
    02:40
  • 88 - Wireshark Summarise Network.mp4
    06:19
  • 89 - Active Scan.mp4
    08:30
  • 90 - MitM Listening to the traffic.mp4
    01:45
  • 91 - Sniffing.mp4
    01:03
  • 92 - TCPDump.mp4
    05:23
  • 93 - Router Switch Hub.mp4
    04:44
  • 94 - How to Expand Sniffing Space.mp4
    05:13
  • 95 - MAC Flood Switching.mp4
    03:55
  • 96 - MAC Flood Using Macof Tool.mp4
    07:09
  • 97 - MacFlood Countermeasures.mp4
    01:13
  • 98 - ARP Spoof.mp4
    03:40
  • 99 - ARP Cache Poisoning using Ettercap.mp4
    10:35
  • 100 - DHCP Starvation & DHCP Spoofing.mp4
    03:36
  • 101 - DHCP Mechanism.mp4
    06:15
  • 102 - DHCP Starvation Scenario.mp4
    03:59
  • 103 - DHCP Starvation Demonstration with Yersinia.mp4
    08:33
  • 104 - VLAN Hopping.mp4
    02:05
  • 105 - VLAN Hopping Switch Spoofing.mp4
    01:39
  • 106 - VLAN Hopping Double Tagging.mp4
    03:17
  • 107 - What is Nmap.mp4
    04:14
  • 108 - Nmap First Scan.mp4
    04:47
  • 109 - Interpretation of Nmap Results.mp4
    02:04
  • 110 - Scanning Specific IPs or Specific Targets With Nmap.mp4
    01:57
  • 111 - Nmap IP List Creation.mp4
    04:07
  • 112 - Nmap Random Scan and Exclude Ips.mp4
    04:17
  • 113 - InputOutput Management.mp4
    08:28
  • 114 - What is Port Nmap Port Scan.mp4
    03:34
  • 115 - Scanning Top 20 Top 100 Ports With Nmap.mp4
    04:43
  • 116 - Scanning Specific Ports With Nmap.mp4
    06:00
  • 117 - Nmap Syn Scannig.mp4
    03:21
  • 118 - Nmap TCP Scan.mp4
    02:46
  • 119 - Nmap UDP Scan.mp4
    04:12
  • 120 - Nmap FiN Xmas Null and ACK Scan in Ethical Hacking.mp4
    02:55
  • 121 - Discovering hosts with ARP ping scans.mp4
    04:52
  • 122 - Discovering hosts with ICMP ping scans.mp4
    03:23
  • 123 - Nmap Fast Scan.mp4
    01:13
  • 124 - Nmap Open Ports Scan.mp4
    01:23
  • 125 - Nmap No PORT Scan.mp4
    02:15
  • 126 - Nmap PING and noPING Scan.mp4
    03:19
  • 127 - Nmap Verbose Command.mp4
    02:15
  • 128 - Nmap Version Detection.mp4
    07:10
  • 129 - Nmap Operating System Detection.mp4
    05:58
  • 130 - Nmap Script Engine NSE.mp4
    10:59
  • 131 - Nmap Script Engine Example 1.mp4
    02:53
  • 132 - Nmap Script Engine Example 2.mp4
    00:58
  • 133 - NMAP Brute Force Attacks.mp4
    04:35
  • 134 - Nmap Timing Templates.mp4
    03:36
  • 135 - Bypass of IPS & IDS Systems With Nmap.mp4
    10:57
  • 136 - Why Metasploit Framework AKA MSF.mp4
    05:33
  • 137 - Importance of Penetration Testing Pentesting.mp4
    03:15
  • 138 - Penetration Testing Execution Standard.mp4
    05:39
  • 139 - Requirements Like Storage Processor.mp4
    02:44
  • 140 - Lab Connectivity and Taking Snapshots.mp4
    02:05
  • 141 - Evolution of Metasploit.mp4
    04:18
  • 142 - Metasploit Filesystem and Libraries.mp4
    04:31
  • 143 - The Architecture of MSF.mp4
    01:43
  • 144 - Auxiliary Modules.mp4
    04:36
  • 145 - Payload Modules.mp4
    06:00
  • 146 - Exploit Modules.mp4
    03:33
  • 147 - Encoder Modules.mp4
    02:35
  • 148 - Post Modules.mp4
    03:24
  • 149 - Metasploit Editions.mp4
    04:02
  • 150 - Metasploit Community.mp4
    03:08
  • 151 - Metasploit Interfaces.mp4
    04:50
  • 152 - Armitage.mp4
    03:16
  • 153 - MSFconsole.mp4
    04:53
  • 154 - MSFConsole Basic Commands 1.mp4
    06:44
  • 155 - MSFConsole Basic Commands 2.mp4
    07:59
  • 156 - MSFConsole Basic Commands 3.mp4
    03:32
  • 157 - Using Databases in MSF 1.mp4
    05:42
  • 158 - Using Databases in MSF 2.mp4
    03:14
  • 159 - More on Exploits in MSF.mp4
    03:14
  • 160 - What is Enumeration.mp4
    02:03
  • 161 - SMB and Samba Enumeration.mp4
    05:40
  • 162 - MySQL Enumeration.mp4
    03:40
  • 163 - FTP Enumeration.mp4
    04:15
  • 164 - SSH Enumeration.mp4
    02:30
  • 165 - HTTP Enumeration.mp4
    06:02
  • 166 - SNMP Enumeration.mp4
    03:43
  • 167 - SMTP Enumeration.mp4
    03:49
  • 168 - NMAP DNS Enumeration.mp4
    06:12
  • 169 - NMAP HTTP Enumeration.mp4
    02:52
  • 170 - NMAP MySQL Enumeration.mp4
    05:06
  • 171 - NMAP SMB Enumeration.mp4
    04:54
  • 172 - NMAP SNMP Enumeration.mp4
    06:56
  • 173 - Terminologies Part 1.mp4
    05:19
  • 174 - Terminologies Part 2.mp4
    06:08
  • 175 - Creating Malware and Terminologies.mp4
    03:36
  • 176 - MSFvenom Part 1.mp4
    14:08
  • 177 - MSFvenom Part 2.mp4
    02:25
  • 178 - Veil Installation.mp4
    02:36
  • 179 - Veil in Action.mp4
    05:12
  • 180 - TheFatRat Installation.mp4
    04:19
  • 181 - TheFatRat in Action.mp4
    11:08
  • 182 - TheFatRat Overcoming a Problem.mp4
    00:46
  • 183 - Embedding Malware in PDF.mp4
    04:04
  • 184 - Embedding Malware in WORD.mp4
    09:21
  • 185 - Embedding Malware in Firefox Addon.mp4
    07:02
  • 186 - Empire Installation.mp4
    04:07
  • 187 - Empire in Action Part 1.mp4
    08:12
  • 188 - Empire in Action Part 2.mp4
    04:23
  • 189 - Exploiting Java Vulnerabilities.mp4
    02:24
  • 190 - Social Engineering Toolkit.mp4
    06:34
  • 191 - Sending Fake Emails Phishing.mp4
    01:11
  • 192 - Vishing Voice Phishing.mp4
    03:41
  • 193 - Hardware and Software Requiments.mp4
    07:02
  • 194 - WiFi Adapter Settings.mp4
    06:17
  • 195 - IEE80211.mp4
    03:54
  • 196 - Basic Terminologies and Concepts.mp4
    04:50
  • 197 - Wireless Operating Modes.mp4
    06:11
  • 198 - MAC Frame Structure.mp4
    02:58
  • 199 - Wireless Packet Types.mp4
    05:22
  • 200 - Wireshark Analysing Packet Types.mp4
    06:33
  • 201 - WiFi Network Interaction.mp4
    05:03
  • 202 - Wireless Encryption Protocols WEP vs WPA.mp4
    03:58
  • 203 - WPA 4Way Handshake.mp4
    05:45
  • 204 - WPA2 Personal and Enterprise.mp4
    03:16
  • 205 - Wireshark WEP and WPA.mp4
    01:10
  • 206 - WiFi Protected Setup WPS.mp4
    03:49
  • 207 - Wireless Recon with Bettercap.mp4
    03:34
  • 208 - Wardriving with Kismet Configuration.mp4
    06:45
  • 209 - Wardriving with Kismet Mapping.mp4
    04:50
  • 210 - Airbaseng.mp4
    05:46
  • 211 - Evil Twin Attack.mp4
    06:42
  • 212 - Wifi Pumpkin 3.mp4
    07:30
  • 213 - Fluxion Installation.mp4
    02:50
  • 214 - Fluxion Handshake Snooper Attack.mp4
    04:54
  • 215 - Fluxion Captive Portal Attack.mp4
    05:28
  • 216 - WEP Cracking Preparing Attacks.mp4
    02:49
  • 217 - WEP Cracking Fake Authentication Attack.mp4
    03:50
  • 218 - WEP Cracking Deauthentication Attack.mp4
    02:59
  • 219 - WEP Cracking Deauthentication Attack with Bettercap.mp4
    01:32
  • 220 - WEP Cracking ARP Request Replay Attack.mp4
    04:15
  • 221 - WEP Cracking Fragmentation Attack.mp4
    05:09
  • 222 - WEP Cracking ChopChop Attack.mp4
    03:47
  • 223 - WPAWPA2 Cracking Introduction.mp4
    05:13
  • 224 - WPAWPA2 Cracking Aircrackng.mp4
    03:57
  • 225 - WPAWPA2 Cracking John The Ripper.mp4
    04:09
  • 226 - WPAWPA2 Cracking CoWPAtty.mp4
    02:52
  • 227 - WPAWPA2 Cracking Wifite 2.mp4
    02:20
  • 228 - WPAWPA2 Cracking with GPUs Hashcat.mp4
    05:25
  • 229 - WPAWPA2 Cracking Key Reinstallation Attack KRACK.mp4
    07:12
  • 230 - WPS Cracking Wifite 2 PIN Attack.mp4
    03:50
  • 231 - Reflected CrossSite Scripting Attacks.mp4
    09:42
  • 232 - Reflected CrossSite Scripting over JSON.mp4
    06:24
  • 233 - Stored CrossSite Scripting Attacks.mp4
    09:56
  • 234 - DOM Based CrossSite Scripting Attacks.mp4
    10:04
  • 235 - Inband SQL Injection over a Search Form.mp4
    14:24
  • 236 - Inband SQL Injection over a Select Form.mp4
    08:22
  • 237 - ErrorBased SQL Injection over a Login Form.mp4
    06:47
  • 238 - SQL Injection over Insert Statement.mp4
    07:07
  • 239 - Boolean Based Blind SQL Injection.mp4
    06:53
  • 240 - Time Based Blind SQL Injection.mp4
    05:34
  • 241 - Detecting and Exploiting SQL Injection with SQLmap.mp4
    11:30
  • 242 - Detecting and Exploiting Error Based SQL Injection with SQLmap.mp4
    05:10
  • 243 - Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap.mp4
    08:02
  • 244 - Command Injection Introduction.mp4
    05:35
  • 245 - Automate Command Injection Attacks Commix.mp4
    05:43
  • 246 - XMLXPATH Injection.mp4
    14:07
  • 247 - SMTP Mail Header Injection.mp4
    06:51
  • 248 - PHP Code Injection.mp4
    06:00
  • 249 - Zed Attack Proxy ZAP A Web App Vulnerability Scanner.mp4
    03:06
  • 250 - Introduction to Burp Downloading Installing and Running.mp4
    08:43
  • 251 - Intercepting HTTP Traffic with Burp Suite.mp4
    03:48
  • 252 - Intercepting HTTPS Traffic with Burp Suite.mp4
    02:52
  • 253 - Definition.mp4
    02:37
  • 254 - Creating a Password List Crunch.mp4
    07:31
  • 255 - Differece Between HTTP and HTTPS Traffic Wireshark.mp4
    03:43
  • 256 - Attacking Insecure Login Mechanisms.mp4
    09:12
  • 257 - Attacking Insecure Logout Mechanisms.mp4
    04:50
  • 258 - Attacking Improper Password Recovery Mechanisms.mp4
    05:50
  • 259 - Attacking Insecure CAPTCHA Implementations.mp4
    08:39
  • 260 - Path Traversal Directory.mp4
    06:43
  • 261 - Path Traversal File.mp4
    05:41
  • 262 - Introduction to File Inclusion Vulnerabilities.mp4
    06:23
  • 263 - Local File Inclusion Vulnerabilities.mp4
    06:11
  • 264 - Remote File Inclusion Vulnerabilities.mp4
    05:51
  • 265 - PostExploitation.mp4
    03:28
  • 266 - What is Persistence.mp4
    01:28
  • 267 - Meterpreters Persistence module.mp4
    08:55
  • 268 - Removing the Backdoor.mp4
    05:00
  • 269 - What is IoT.mp4
    03:24
  • 270 - Where does IoT Exist in Our Lives.mp4
    01:47
  • 271 - How does IoT work.mp4
    00:47
  • 272 - Connection Standarts.mp4
    09:06
  • 273 - IoT Security.mp4
    07:04
  • 274 - Mobile Security Threats.mp4
    08:02
  • 275 - Bash Scripting 101.mp4
    04:18
  • 276 - Installing Anaconda Distribution For Windows in Python.mp4
    02:49
  • 277 - Installing Python 397 and PyCharm For Windows in Python.mp4
    04:19
  • 278 - Variables in python.mp4
    08:35
  • 279 - Numbers in Python.mp4
    10:20
  • 280 - String Operations and Useful String Methods in python examples.mp4
    05:37
  • 281 - Data Type Conversion in Python.mp4
    03:53
  • 282 - Exercise Company Email Generator in python.mp4
    02:57
  • 283 - Conditionals in python.mp4
    01:40
  • 284 - bool Function in Python.mp4
    02:08
  • 285 - Comparison and Logical Operators in Python.mp4
    09:05
  • 286 - If Statements in Python.mp4
    09:59
  • 287 - Exercise Calculator.mp4
    11:05
  • 288 - Loops in Python.mp4
    01:31
  • 289 - While Loops in Python.mp4
    04:15
  • 290 - For Loops in python.mp4
    04:29
  • 291 - Range Function in Python.mp4
    03:24
  • 292 - Control Statements in python.mp4
    05:03
  • 293 - Functions in Python Programming.mp4
    02:11
  • 294 - Create A New Function and Function Calls in Python programming.mp4
    03:53
  • 295 - Return Statement in python.mp4
    04:36
  • 296 - Lambda Functions in Python.mp4
    02:58
  • 297 - Lists and List Operations in Python Programming.mp4
    04:55
  • 298 - List Methods in Python Programming.mp4
    05:35
  • 299 - Dictionaries in Python Handson.mp4
    10:15
  • 300 - Dictionary Comprehensions in Python Handson.mp4
    02:20
  • 301 - Logic of OOP in Object Oriented Programming OOP.mp4
    04:58
  • 302 - Constructor in Object Oriented Programming OOP.mp4
    06:34
  • 303 - Methods in Object Oriented Programming OOP.mp4
    04:41
  • 304 - Inheritance in Object Oriented Programming OOP.mp4
    06:42
  • 305 - Overriding and Overloading in Object Oriented Programming OOP.mp4
    10:33
  • 306 - Ruby Set Up Installing Ruby on Windows.mp4
    02:00
  • 307 - Ruby Development Editor.mp4
    03:18
  • 308 - First Program.mp4
    06:25
  • 309 - Debugging.mp4
    02:05
  • 310 - Comments.mp4
    01:02
  • 311 - What is a variable.mp4
    03:42
  • 312 - Data Types.mp4
    03:07
  • 313 - Arithmetic Operators.mp4
    02:16
  • 314 - Assignment Operator.mp4
    02:15
  • 315 - Parallel Assignment.mp4
    02:03
  • 316 - Comparison Operators.mp4
    05:10
  • 317 - Logical Operators.mp4
    01:28
  • 318 - Special Operators.mp4
    02:27
  • 319 - Operation Ordering.mp4
    03:00
  • 320 - String Operations.mp4
    09:50
  • 321 - String Methods.mp4
    06:18
  • 322 - If Statements.mp4
    10:38
  • 323 - Unless Statements.mp4
    04:06
  • 324 - Case Statements.mp4
    04:00
  • 325 - Loops.mp4
    04:24
  • 326 - For Loops and Iterators.mp4
    03:34
  • 327 - Do While Loops.mp4
    01:19
  • 328 - Break and Next Keywords.mp4
    03:59
  • 329 - Method Calls.mp4
    02:24
  • 330 - Create A New Method.mp4
    05:02
  • 331 - Blocks.mp4
    03:47
  • 332 - Method Arguments.mp4
    05:51
  • 333 - Lambda Functions.mp4
    03:46
  • 334 - Global and Local Variables.mp4
    04:19
  • 335 - Recursive Functions.mp4
    03:15
  • 336 - Modules.mp4
    05:46
  • 337 - Arrays.mp4
    04:12
  • 338 - Traverse an Array.mp4
    04:12
  • 339 - Array Operations.mp4
    08:11
  • 340 - Array Methods.mp4
    08:25
  • 341 - Hashes.mp4
    04:52
  • 342 - Traverse a Hash.mp4
    02:45
  • 343 - Hash Operations.mp4
    01:51
  • 344 - Hash Methods.mp4
    06:04
  • 345 - Files and Directories.mp4
    08:17
  • 346 - File Operations.mp4
    07:49
  • 347 - Exceptions.mp4
    12:03
  • 348 - ThrowCatch Statements.mp4
    05:37
  • 349 - CompTIA Pentest PT0002 Ethical Hacking Complete Course.html
  • Description


    Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hacker

    What You'll Learn?


    • CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing (pentesting) and vulnerability management.
    • CompTIA PenTest+ is the most comprehensive exam covering all penetration testing stages.
    • Unlike other penetration testing exams, PenTest+ uses both performance-based and knowledge
    • PenTest+ is the most current penetration testing exam covering the latest techniques against expanded attack surfaces.
    • CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment.
    • The CompTIA PenTest+ certification is a vendor-neutral, internationally targeted validation of intermediate-level penetration testing (or pentesting) knowledge
    • What is the CompTIA Pentest+ exam?
    • Why is the CompTIA Pentest+ course important?
    • All information on CompTIA Pentest+ exam topics.
    • What are Attacks, Threats and Vulnerabilities?
    • What are network topologies and network attacks?
    • What Are Social Engineering Attacks?
    • What is the threat, what are the types of threats, and how is the threat analysis done?
    • What are the programs used for the attack?
    • What should be the architecture and design under CompTIA Pentest+?
    • What is Vulnerability scanning?
    • What is Nmap and how can we use it?
    • What is IoT & Mobile?
    • What is Metasploit Framework?
    • What is enumeration?
    • You will learn to troubleshoot hardware, network and software
    • You will learn about Wi-Fi hacking
    • You will learn Top 10 Web Application Security Risks – 2023
    • You will learn Web Application Pentesting
    • You will learn Authentication and Authorization Testing
    • You will learn Post exploitation
    • You will learn What is scripting and how can we analyze a script
    • You will learn writing a pentest report

    Who is this for?


  • Those who want to get CompTIA Pentest+ certificate.
  • Anyone interested in security
  • Those who have a career goal in the field of security.
  • Those who have a basic knowledge of security and want to take it to higher levels.
  • Those who want to learn about pentest+, pentesting, ethical hacking, comptia pentest+ pt0-002
  • Those who want to be certified ethical hacker
  • Those who want to step into the world of security
  • Junior Security elements.
  • Those who want to step into the Penetration Testing.
  • What You Need to Know?


  • Desire to get CompTIA Pentest+ certification
  • Desire to learn about pentest+, pentesting, ethical hacking
  • Desire to be certified ethical hacker
  • Watching the lecture videos completely, to the end and in order.
  • Internet Connection
  • Any device you can watch the course, such as a mobile phone, computer or tablet.
  • Determination and patience to learn.
  • Any device that can be built a lab
  • More details


    Description

    Hello there,

    Welcome to “CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab” course.

    Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hacker


    CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing (pentesting) and vulnerability management.

    CompTIA PenTest+ is the most comprehensive exam covering all penetration testing stages. Unlike other penetration testing exams that only cover a portion of stages with essay questions and hands-on, PenTest+ uses both performance-based and knowledge-based questions to ensure all stages are addressed. Pentest, ethical hacking, pentest+, comptia pentest, certified ethical hacker, hacking, pentesting, comptia pentest+, comptia, comptia pentest pt0-002, comptia, ceh, comptia pentest+ pt0-002

    PenTest+ is the only exam on the market to include all aspects of vulnerability management. It not only covers hands-on vulnerability assessment, scanning, and analysis, but also includes planning, scoping, and managing weaknesses, not just exploiting them.

    PenTest+ is the most current penetration testing exam covering the latest techniques against expanded attack surfaces. It is a unique exam that requires a candidate to demonstrate the most relevant pen testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises.

    CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment. Cybersecurity professionals with CompTIA PenTest+ know how plan, scope, and manage weaknesses, not just exploit them.

    IT certifications show employers that candidates have the knowledge and skills they need to do the job, and they help IT pros advance in their careers. As cybersecurity has become a critical function, cybersecurity certifications are among the most popular IT certifications globally.

    The CompTIA PenTest+ certification is a vendor-neutral, internationally targeted validation of intermediate-level penetration testing (or pen testing) knowledge and skills. It focuses on the latest pen testing techniques, attack surfaces, vulnerability management, post-delivery and compliance tasks.


    This course walks you through all the things you need to pass the CompTIA Pentest+ PT0-001 & PT0-002 exam, step by step.

    You can pass the CompTIA Pentest+ exam by studying the topics covered throughout the course.

    By the way, you don't need to know anything for this course.

    We will tell you all the things you need to pass the CompTIA Pentest+ PT0-001 & PT0-002 exam.

    Our course points too much topics.

    However, in order to better understand the topics, these basic topics are divided into parts and explained in 21 small chapters.

    Each of the sections is important on its own. It also relates to other departments.

    As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.

    For example, the subject of encryption is mentioned in many places.

    Although the basic meaning is the same, usage types can gain different meanings on different platforms.

    The narration of the topics is brief and for the exam.

    We will make sample applications for some of the topics covered in our course.

    We will create a virtual Lab for the application.

    If you wish, you can improve yourself by using the topics covered in the lessons.

    Because at the end of the course, you will see all the topics used in the field of Security.

    All you have to do is search the subject on the internet and continue learning.

    This course is for CompTIA Pentest+ PT0-002 Certification


    PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. The CompTIA PenTest+ certification exam will verify successful candidates have the knowledge and skills required to:


    • Plan and scope a penetration testing engagement

    • Understand legal and compliance requirements

    • Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results

    • Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations

    Questions are asked from the fields. Throughout the course, topics related to these areas are explained.

    In this course you will learn;


    • Passing the CompTIA Pentest+ certification exam with confidence

    • Understand computer security, its functions, and its components

    • Performing penetration tests

    • Network topologies and Network attacks

    • Threat analysis

    • Script analyzing

    • Writing a pentest report

    • Using Metasploit Framework

    Frequently asked questions

    What Is CompTIA PenTest+ Certification?

    CompTIA PenTest+ is a certification for cybersecurity professionals tasked with penetration testing and vulnerability assessment and management. CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment.

    What Job Roles Should Take the Exam?

    CompTIA PenTest+ is for IT cybersecurity professionals with three to four years of hands-on information security or related experience, or equivalent training, looking to start or advance a career in pen testing. CompTIA PenTest+ prepares candidates for the following job roles:

    • Penetration tester

    • Vulnerability tester

    • Security analyst (II)

    • Vulnerability assessment analyst

    • Network security operations

    • Application security vulnerability

    What Is on the CompTIA PenTest+ Exam?

    CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment.

    Successful candidates will have the following skills to:

    • Plan and scope penetration tests

    • Conduct passive reconnaissance

    • Perform non-technical tests to gather information

    • Conduct active reconnaissance

    • Analyze vulnerabilities

    • Penetrate networks

    • Exploit host-based vulnerabilities

    • Test applications

    • Complete post-exploit tasks

    • Analyze and report penetration test results

    The CompTIA PenTest+ exam covers the following domains and topics:


    • Planning and Scoping: Explain the importance of planning for an engagement

    • Information Gathering and Vulnerability Identification: Conduct information gathering using appropriate techniques and perform and analyze a vulnerability scan

    • Attacks and Exploits: Compare and contrast social engineering attacks

    • Penetration Testing Tools: Use NMAP to conduct information gathering exercises

    • Reporting and Communication: Recommend mitigation strategies for discovered vulnerabilities

    Who Is CompTIA?

    CompTIA (the Computing Technology Industry Association) is the leading provider of vendor-neutral IT certifications in the world. With more than 2 million IT certifications issued worldwide, CompTIA is dedicated to helping IT professionals lead the charge in our digitally connected world.

    For more than 20 years, CompTIA has developed training and certification exams for computing support, networking, security, open-source (Linux) development, cloud and mobility. Our regular review and updates of exams ensure that CompTIA certifications continue to address the needs of today’s technology challenges.


    What is penetration testing?

    Penetration testing, or pen testing, is the process of attacking an enterprise's network to find any vulnerabilities that could be present to be patched. Ethical hackers and security experts carry out these tests to find any weak spots in a system’s security before hackers with malicious intent find them and exploit them. Someone who has no previous knowledge of the system's security usually performs these tests, making it easier to find vulnerabilities that the development team may have overlooked. You can perform penetration testing using manual or automated technologies to compromise servers, web applications, wireless networks, network devices, mobile devices, and other exposure points.

    What are the different types of penetration testing?

    There are many types of penetration testing. Internal penetration testing tests an enterprise's internal network. This test can determine how much damage can be caused by an employee. An external penetration test targets a company's externally facing technology like their website or their network. Companies use these tests to determine how an anonymous hacker can attack a system. In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring, including any security professional. This type of test will test not only systems but a company's response to an active attack. With a closed-box penetration test, a hacker may know nothing about the enterprise under attack other than its name. In an open-box test, the hacker will receive some information about a company's security to aid them in the attack.

    What are the different stages of penetration testing?

    Penetration tests have five different stages. The first stage defines the goals and scope of the test and the testing methods that will be used. Security experts will also gather intelligence on the company's system to better understand the target. The second stage of a pen test is scanning the target application or network to determine how they will respond to an attack. You can do this through a static analysis of application code and dynamic scans of running applications and networks. The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. The fifth and final stage of a pen test is the reporting phase, when testers compile the test results.

    What is Ethical Hacking and what is it used for?

    Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities. An ethical hacker is also sometimes referred to as a white hat hacker. Many depend on ethical hackers to identify weaknesses in their networks, endpoints, devices, or applications. The hacker informs their client as to when they will be attacking the system, as well as the scope of the attack. An ethical hacker operates within the confines of their agreement with their client. They cannot work to discover vulnerabilities and then demand payment to fix them. This is what gray hat hackers do. Ethical hackers are also different from black hat hackers, who hack to harm others or benefit themselves without permission.


    No prior knowledge is needed!

    Why would you want to take this course?

    Our answer is simple: The quality of teaching.

    When you enroll, you will feel our seasoned instructors' expertise.

    Video and Audio Production Quality

    All our videos are created/produced as high-quality video and audio to provide you the best learning experience.

    You will be,

    • Seeing clearly

    • Hearing clearly

    • Moving through the course without distractions


    You'll also get:

    • Lifetime Access to The Course

    • Fast & Friendly Support in the Q&A section

    • Udemy Certificate of Completion Ready for Download

    Dive in now “CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab” course.

    Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hacker


    We offer full support, answering any questions.

    See you in the course!


    Who this course is for:

    • Those who want to get CompTIA Pentest+ certificate.
    • Anyone interested in security
    • Those who have a career goal in the field of security.
    • Those who have a basic knowledge of security and want to take it to higher levels.
    • Those who want to learn about pentest+, pentesting, ethical hacking, comptia pentest+ pt0-002
    • Those who want to be certified ethical hacker
    • Those who want to step into the world of security
    • Junior Security elements.
    • Those who want to step into the Penetration Testing.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hi there,By 2024, there will be more than 1 million unfilled computing jobs and the skills gap is a global problem. This was our starting point.At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. We know the tech industry. And we know the tech industry's biggest problem is the “tech skills gap” and here is our solution.OAK Academy will be the bridge between the tech industry and people who-are planning a new career-are thinking career transformation-want career shift or reinvention,-have the desire to learn new hobbies at their own paceBecause we know we can help this generation gain the skill to fill these jobs and enjoy happier, more fulfilling careers. And this is what motivates us every day.We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to our practical alignment we are able to constantly translate industry insights into the most in-demand and up-to-date courses,OAK Academy will provide you the information and support you need to move through your journey with confidence and ease.Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.If you need help or if you have any questions, please do not hesitate to contact our team.
    OAK Academy Team
    OAK Academy Team
    Instructor's Courses
    We are the student support team that does both teaching and course preparation at the oak academy. The satisfaction of our students is our priority and source of motivation. You can use this profile for your technical support requests and problems you encounter after purchasing our courses, and you can send your questions to us.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 347
    • duration 28:03:45
    • Release Date 2024/03/11