CompTIA PenTest PT1-001
Focused View
6:29:03
82 View
01 - CompTIA PenTest+ (PT1-001) Complete Video Course - Introduction.mp4
02:02
02 - Learning objectives.mp4
00:35
03 - 1.1 Understanding Ethical Hacking and Penetration Testing.mp4
06:28
04 - 1.2 Understanding the Current Threat Landscape.mp4
03:07
05 - 1.3 Exploring Penetration Testing Methodologies.mp4
09:13
06 - 1.4 Building Your Own Lab.mp4
06:00
07 - 1.5 Tips on How to Prepare for the Exam.mp4
01:54
08 - Learning objectives.mp4
00:37
09 - 2.1 Explaining the Importance of the Planning and Preparation Phase.mp4
17:34
10 - 2.2 Understanding the Legal Concepts of Penetration Testing.mp4
05:37
11 - 2.3 Learning How to Scope a Penetration Testing Engagement Properly.mp4
06:49
12 - 2.4 Learning the Key Aspects of Compliance-based Assessments.mp4
04:44
13 - Module 2 - Introduction.mp4
00:26
14 - Learning objectives.mp4
00:38
15 - 3.1 Conducting Information Gathering and Reconnaissance.mp4
02:34
16 - 3.2 Performing Port Scanning.mp4
11:46
17 - 3.3 Performing and Analyzing Vulnerability Scans.mp4
10:19
18 - 3.4 Leveraging Reconnaissance Results to Prepare for the Exploitation Phase.mp4
02:14
19 - Module 3 - Introduction.mp4
00:35
20 - Learning objectives.mp4
00:43
21 - 4.1 Understanding Phishing and Spear Phishing Attacks.mp4
01:28
22 - 4.2 Understanding Pharming, Whaling, Malvertising, SMS Phishing, and Voice Phishing Attacks.mp4
03:53
23 - 4.3 Describing what is Elicitation, Interrogation, and Impersonation (Pretexting).mp4
02:15
24 - 4.4 Understanding What is Social Engineering Motivation Techniques.mp4
01:16
25 - 4.5 Understanding What is Shoulder Surfing.mp4
00:58
26 - 4.6 Understanding What is USB Key Drop.mp4
01:11
27 - Learning objectives.mp4
01:27
28 - 5.1 Exploiting Windows Name Resolution-based Vulnerabilities.mp4
09:16
29 - 5.2 Surveying DNS Cache Poisoning Attacks.mp4
04:05
30 - 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations.mp4
07:54
31 - 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits.mp4
03:42
32 - 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities.mp4
06:18
33 - 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities.mp4
02:34
34 - 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks.mp4
09:49
35 - 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks.mp4
02:36
36 - 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks.mp4
10:06
37 - 5.10 Understanding Rogue Access Points and Evil Twin Attacks.mp4
01:55
38 - 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists.mp4
05:37
39 - 5.12 Jamming Wireless Signal, Causing Interference, and War Driving.mp4
02:11
40 - 5.13 Understanding the WEP Protocol.mp4
01:46
41 - 5.14 Cracking WEP Implementations.mp4
05:14
42 - 5.15 Understanding the WPA Protocol.mp4
02:20
43 - 5.16 Attacking WPA2 Implementations.mp4
03:24
44 - Learning objectives.mp4
00:52
45 - 6.1 Overview of Web Applications for Security Professionals.mp4
18:56
46 - 6.2 How to Build Your Own Web Application Lab.mp4
04:48
47 - 6.3 Understanding SQL Injection.mp4
14:54
48 - 6.4 Understanding Injection Vulnerabilities.mp4
01:30
49 - 6.5 Exploiting Command Injection Vulnerabilities.mp4
02:35
50 - 6.6 Understanding Authentication-based Vulnerabilities.mp4
17:20
51 - 6.7 Exploiting Authorization-based Vulnerabilities.mp4
02:26
52 - 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities.mp4
05:33
53 - 6.9 Understanding Cross-site Request Forgery (CSRF XSRF).mp4
02:27
54 - 6.10 Understanding Clickjacking.mp4
01:15
55 - 6.11 Exploiting Insecure Direct Object References and Path Traversal.mp4
06:58
56 - 6.12 Assessing Unsecure Code Practices and APIs.mp4
05:19
57 - Learning objectives.mp4
00:16
58 - 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp4
00:48
59 - 7.2 Exploiting Insecure Service and Protocol Configurations.mp4
03:42
60 - 7.3 Understanding Local Privilege Escalation.mp4
02:50
61 - 7.4 Understanding Linux Permissions.mp4
04:36
62 - 7.5 Understanding SUID or SGID and Unix Programs.mp4
01:57
63 - 7.6 Exploiting Insecure SUDO Implementations.mp4
03:19
64 - 7.7 Understanding Ret2libc Attacks.mp4
03:12
65 - 7.8 Understanding Windows Privileges.mp4
01:47
66 - 7.9 Surveying Kerberoasting.mp4
01:06
67 - 7.10 Exploiting Other Windows-based Vulnerabilities.mp4
06:27
68 - 7.11 Understanding What Are Key Loggers.mp4
02:01
69 - 7.12 Understanding What Are Scheduled Tasks.mp4
00:56
70 - 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp4
08:29
71 - 7.14 Surveying Mobile Device Security.mp4
11:02
72 - 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp4
05:09
73 - Learning objectives.mp4
00:29
74 - 8.1 Maintaining Persistence After Compromising a System.mp4
07:46
75 - 8.2 Understanding How to Perform Lateral Movement and Pivoting.mp4
03:28
76 - 8.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4
01:49
77 - Module 4 - Introduction.mp4
00:29
78 - Learning objectives.mp4
00:55
79 - 9.1 Understanding the Different Use Cases of Penetration Testing Tools.mp4
01:51
80 - 9.2 Exploring Tools for Reconnaissance.mp4
07:23
81 - 9.3 Exploring Tools for Vulnerability Scanning.mp4
01:36
82 - 9.4 Exploring Tools for Credential Attacks.mp4
04:00
83 - 9.5 Exploring Tools for Persistence.mp4
01:25
84 - 9.6 Exploring Tools for Evasion.mp4
04:10
85 - 9.7 Exploring Tools for De-compilation.mp4
05:01
86 - 9.8 Exploring Tools for Forensics.mp4
03:02
87 - 9.9 Exploring Tools for Software Assurance.mp4
03:55
88 - 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp4
02:11
89 - Learning objectives.mp4
00:37
90 - 10.1 Surveying Report Writing and Handling Best Practices.mp4
04:55
91 - 10.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4
02:12
92 - 10.3 Explaining the Importance of Appropriate Communication.mp4
03:10
93 - CompTIA PenTest+ (PT1-001) Complete Video Course - Summary.mp4
00:59
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 93
- duration 6:29:03
- Release Date 2023/11/07