Companies Home Search Profile

CompTIA Pentest+ Training & LAB

Focused View

Vijay Kumar

20:57:44

126 View
  • 1. Introduction.mp4
    11:35
  • 1. Cyber Health and Risk management.mp4
    11:36
  • 2. Penetration Testing Processes.mp4
    09:38
  • 3. PCI DSS Payment Card Industry Data security standard.mp4
    09:16
  • 4. GDPR and other laws.mp4
    08:11
  • 5. Identifying Pentesting Frameworks.mp4
    05:22
  • 6. Different penetration testing frameworks..mp4
    05:46
  • 7. Investigating CVE and CWE.mp4
    07:17
  • 1. Assess Environmental Considerations.mp4
    21:31
  • 2. Outline the Rules of Engagement.mp4
    12:18
  • 3. Prepare Legal Documents.mp4
    11:16
  • 1. How to access the CompTIA Pentest+ lab.mp4
    02:03
  • 2. Discover the Target.mp4
    13:41
  • 3. Gather information from source code repository.mp4
    05:45
  • 4. Google hacking and Google hacking database.mp4
    07:27
  • 5. Gather information from archive and image search.mp4
    07:26
  • 6. Retrieve Website information.mp4
    10:39
  • 7. Testing ssl and TLS certificate.mp4
    12:00
  • 8. LAB nslookup dig and whois -1.mp4
    10:31
  • 9. Discover Open-Source Intelligence Tools.mp4
    14:29
  • 10. LAB Use tool harvester for gathering emails.mp4
    05:19
  • 1. Social engineering motivation Techniques.mp4
    18:15
  • 2. Social engineering attack.mp4
    13:06
  • 3. Social engineering Countermeasures.mp4
    03:58
  • 4. Some other type of social engineering attacks.mp4
    07:47
  • 5. Physical attacks in the term of social engineering.mp4
    16:09
  • 6. LAB - Social Engineering Toolkit.mp4
    13:12
  • 1. Overview of Vulnerability.mp4
    08:13
  • 2. Life Cycle of Vulnerability.mp4
    07:28
  • 3. Researching Vulnerabilities - CVE.mp4
    08:39
  • 4. CWE - Common Weakness Enumeration.mp4
    06:39
  • 5. CAPEC- Common Attack Pattern Enumeration and Classification.mp4
    05:45
  • 6. MITRE Attack Adversarial Tactics, Techniques and Common Knowledge.mp4
    10:00
  • 1. Web vulnerability scanning with Nikto.mp4
    03:51
  • 2. Web Vulnerability Scanning with Wapiti.mp4
    03:28
  • 3. Vulnerability scanning with OpenVAS.mp4
    08:07
  • 4. OpenVAS Report Analyze.mp4
    02:17
  • 5. Automating Vulnerability Scanning with Nessus.mp4
    09:52
  • 6. Nessus Scan Analyze the scan Report.mp4
    04:12
  • 1. nmap basic syntax for host discovery in the netowrk.mp4
    09:06
  • 2. Different scanning Techniques to Bypass Firewall, IDS and IPS.mp4
    05:12
  • 3. LAB host discovery by using nmap.mp4
    07:16
  • 4. Different techniques used for scanning ports.mp4
    10:27
  • 5. Fingerprinting and Enumeration with nmap.mp4
    09:46
  • 6. nmap script engine for Vulnerability scanning.mp4
    08:22
  • 1. Flying under the Radar.mp4
    11:42
  • 2. Bypassing network Access Control NAC.mp4
    02:09
  • 3. LOITL and covering the Track..mp4
    04:47
  • 4. Tiding Logs and Entries.mp4
    08:33
  • 5. Using Steganography to Hide and Conceal Data.mp4
    07:25
  • 6. Data Exfiltration and SSH Channel.mp4
    06:13
  • 7. Netcat and winrm to manage covert channel..mp4
    04:55
  • 8. Using Proxy and Proxy Chaining.mp4
    02:55
  • 1. What is network attacks.mp4
    04:04
  • 2. Load balance or stress testing.mp4
    09:29
  • 3. Protect transmission stream.mp4
    09:40
  • 4. Bluetooth Attacks in Network.mp4
    06:25
  • 5. RFID and NFC Attacks.mp4
    05:28
  • 6. ARP poisoning Attack.mp4
    10:44
  • 7. ARP poisoning attack using ettercap to capture password..mp4
    08:43
  • 8. Arp Spoofing Attack with arpspoof tool.mp4
    06:00
  • 9. MAC table overflow Attack.mp4
    03:56
  • 10. What mac spoofing attack LAB in Linux.mp4
    16:09
  • 11. VLAN hopping and double Tagging attack.mp4
    13:53
  • 12. DNS poisoning Attack using ettercap.mp4
    20:06
  • 13. Password Attacks.mp4
    08:42
  • 14. Password attack Demonstration LAB.mp4
    12:35
  • 15. Pass the hash Attack and Kerboroasting Attack.mp4
    05:11
  • 16. Kerboroasting a Complete LAB demo.mp4
    21:04
  • 17. On path attack in Network.mp4
    11:17
  • 18. LLMNR and NBT-NS Poisoning Attack with Example and LAB.mp4
    12:13
  • 19. Advance password attacks and prevention techniques.mp4
    05:56
  • 20. NAC Bypass Attack in Network.mp4
    04:37
  • 21. Using Reverse and bind Shell LAB.mp4
    17:41
  • 22. Exploit Resources Exploit-DB or Chaining.mp4
    15:37
  • 1. Securing Wireless Communication.mp4
    14:26
  • 2. Signal transmission and Exploitation.mp4
    06:49
  • 3. Quick demo on capture wireless data.mp4
    04:28
  • 4. deauthentication attack inside wireless network.mp4
    03:43
  • 5. LAB deauthentication attack agains wireless network.mp4
    08:53
  • 6. Wi-Fi Jamming Attack.mp4
    03:08
  • 7. Crack WPA and WPA2 key with Demo.mp4
    07:22
  • 8. Cracking WEP - LAB.mp4
    05:03
  • 9. Cracking WPS wireless security.mp4
    06:03
  • 10. Evil Twins attack.mp4
    05:43
  • 1. Mobile device vulnerability and deployment methods.mp4
    10:25
  • 2. Controlling access.mp4
    06:19
  • 3. EMM Security policies and protecting data.mp4
    09:55
  • 4. Vulnerability and protection of Android and iOS device.mp4
    10:16
  • 5. Attacking on mobile platforms.mp4
    08:07
  • 6. Moving through attacks and spyware.mp4
    03:12
  • 7. Bluetooth attack and malware analysis.mp4
    05:08
  • 1. Identify Vulnerabilities and attacks on IoT Devices.mp4
    20:28
  • 2. Leveraging the Protocols.mp4
    06:28
  • 3. LAB Discovering IoT devices with Shodan.mp4
    06:01
  • 4. Recognize Other Vulnerable Systems.mp4
    17:46
  • 1. Exposing Sensitive Data with improper error handling.mp4
    08:20
  • 2. Missing Input Validation and Signing the Code.mp4
    06:05
  • 3. Causing a Race condition.mp4
    05:05
  • 4. Hijacking Session Credentials.mp4
    08:18
  • 5. Crafting Request Forgery Attacks.mp4
    08:03
  • 6. Privilege Escalation.mp4
    05:04
  • 7. Upgrading a Non-Interactive Shell.mp4
    04:38
  • 8. Identifying SQLi Vulnerabilities.mp4
    07:57
  • 9. Traversing Files Using Invalid Input.mp4
    04:52
  • 10. Executing Cross Site Scripting XSS attack and Web proxy.mp4
    04:09
  • 11. LAB SQL Injection Attack.mp4
    04:49
  • 12. Overview of Web Testing Tools.mp4
    03:18
  • 13. Exploring the Browser Exploit Framework BeEF.mp4
    04:02
  • 1. Objectives Perform System Hacking.mp4
    01:27
  • 2. Net framework and Powershell in Windows 10.mp4
    05:41
  • 3. Command and Control C2 Frameworks.mp4
    05:14
  • 4. LAB Using Reverse Shell and Bind Shell.mp4
    08:52
  • 5. Remote Access Tool - Netcat.mp4
    05:01
  • 6. Communicating withing a Secure Shell (SSH).mp4
    08:06
  • 7. Analyze Exploit code.mp4
    07:37
  • 1. Analyzing and automating tasks using scripting.mp4
    11:11
  • 2. Basic understanding about scripting languages.mp4
    11:33
  • 3. LAB Exploring Programming Shells.mp4
    15:30
  • 4. Basics of logic construct.mp4
    11:37
  • 5. Data structure in python.mp4
    07:02
  • 6. LAB Automate the penetration testing process.mp4
    05:45
  • 7. Automate Penetration Testing.mp4
    02:53
  • 1. Password cracking method online and offline.mp4
    09:13
  • 2. Dictionary attack and bypass lockout policy.mp4
    07:28
  • 3. Bruteforce and password spraying attack.mp4
    03:39
  • 4. Test Credential as Linux and Windows.mp4
    07:54
  • 5. LAB password attack.mp4
    09:44
  • 6. LAB post exploitation Techniques.mp4
    28:33
  • 1. Define and outlining the communication Path.mp4
    07:13
  • 2. Communicating with Client Counterparts.mp4
    02:05
  • 3. Defining Contacts.mp4
    03:34
  • 4. Triggering Communication Events and Prioritize findings.mp4
    05:49
  • 5. Providing Situational Awareness and Criminal Activity.mp4
    05:46
  • 6. Triggering and Investigating False Positives.mp4
    04:25
  • 7. Presenting the Findings.mp4
    05:40
  • 8. Sharing and Building Reports with Dardis and Nessus.mp4
    03:35
  • 1. Identify Report Audience.mp4
    08:26
  • 2. List Report Contents.mp4
    34:34
  • 3. Define Best Practices for Reports.mp4
    23:49
  • 1. Hardening the System.mp4
    10:42
  • 2. Sanitizing User Input.mp4
    08:31
  • 3. Implementing Multifactor Authentication MFA.mp4
    08:13
  • 4. Encrypting the password.mp4
    05:10
  • 5. Process-Level Remediation and Patch Management.mp4
    08:09
  • 6. Key rotation and Certificate Management.mp4
    06:04
  • 7. Providing Secret Management Solution and Network Segmentation.mp4
    05:14
  • Description


    Penetration Testing Strategies for Network Security and Web Applications

    What You'll Learn?


    • Conduct comprehensive network penetration tests to identify vulnerabilities and strengthen network security.
    • Perform thorough web application assessments, uncovering and mitigating common vulnerabilities like SQL injection and XSS.
    • Master penetration testing methodologies, including reconnaissance, scanning, exploitation, and post-exploitation techniques.
    • Utilize threat intelligence effectively to proactively identify, analyze, and mitigate cyber threats, enhancing overall cybersecurity posture.

    Who is this for?


  • Cybersecurity professionals interested in specializing in penetration testing.
  • IT professionals seeking to enhance their skills in identifying and mitigating security vulnerabilities.
  • Network administrators and engineers involved in securing network infrastructure.
  • Web developers and application security professionals aiming to improve web application security.
  • Students and individuals looking to start a career in cybersecurity with a focus on penetration testing.
  • What You Need to Know?


  • Prerequisites for the CompTIA Pentest+ course: Basic understanding of cybersecurity concepts. Familiarity with networking principles and protocols. Proficiency in using operating systems such as Windows and Linux. Knowledge of web application basics (HTTP/HTTPS, HTML, etc.). Access to a computer with internet connectivity for hands-on labs and exercises.
  • More details


    Description

    Welcome to the CompTIA Pentest+ course, where you'll dive deep into the world of penetration testing to secure networks and web applications effectively. This comprehensive course is designed to equip you with the knowledge and skills needed to become a proficient cybersecurity professional in the field of penetration testing.

    Throughout this course, you will explore a range of topics essential for mastering penetration testing techniques. You'll start by understanding the fundamentals of network security, learning how to identify vulnerabilities, and implementing robust security measures to protect networks from cyber threats.

    Next, you'll delve into the realm of web application testing, where you'll discover common vulnerabilities found in web applications and how to conduct thorough assessments to uncover potential security risks. You'll gain hands-on experience with techniques such as SQL injection, cross-site scripting (XSS), and authentication bypass.

    One of the key focuses of this course is penetration testing methodologies. You'll learn industry-standard methodologies and frameworks for conducting penetration tests, including reconnaissance, scanning, exploitation, and post-exploitation techniques. You'll also explore the importance of ethical hacking practices and responsible disclosure.

    Moreover, you'll delve into threat intelligence and how to leverage it effectively to identify and respond to emerging cyber threats proactively. You'll learn how to analyze threat intelligence data, assess the impact of threats, and develop strategies to mitigate risks.

    By the end of this course, you'll have the skills and confidence to conduct penetration tests effectively, identify security vulnerabilities, and implement robust security measures to protect networks and web applications from cyber attacks. Whether you're an aspiring cybersecurity professional or looking to advance your career in penetration testing, this course will provide you with the expertise needed to succeed in the rapidly evolving field of cybersecurity.

    Who this course is for:

    • Cybersecurity professionals interested in specializing in penetration testing.
    • IT professionals seeking to enhance their skills in identifying and mitigating security vulnerabilities.
    • Network administrators and engineers involved in securing network infrastructure.
    • Web developers and application security professionals aiming to improve web application security.
    • Students and individuals looking to start a career in cybersecurity with a focus on penetration testing.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I have several years of experience in the field of Cyber Security as a Trainer. Experience in delivering Training on Ethical Hacking, VAPT, CompTIA Security +, CySA, CEH, OSCP, Linux System & Server Administrator, CompTIA N+, CCNA. I have delivered training to more than 100+ colleges including IIT and NIIT, and Corporate, and Government Bodies.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 147
    • duration 20:57:44
    • Release Date 2024/07/22