Pearson IT CompTIA PenTest Plus PT1-001
Focused View
1:27:53
57 View
01 - CompTIA PenTest+ (PT1-001) Complete Video Course - Introduction.mp4
01:00
02 - Learning objectives.mp4
00:35
03 - 1.1 Understanding Ethical Hacking and Penetration Testing.mp4
01:00
04 - 1.2 Understanding the Current Threat Landscape.mp4
01:00
05 - 1.3 Exploring Penetration Testing Methodologies.mp4
01:00
06 - 1.4 Building Your Own Lab.mp4
01:00
07 - 1.5 Tips on How to Prepare for the Exam.mp4
01:00
08 - Learning objectives.mp4
00:37
09 - 2.1 Explaining the Importance of the Planning and Preparation Phase.mp4
01:00
10 - 2.2 Understanding the Legal Concepts of Penetration Testing.mp4
01:00
11 - 2.3 Learning How to Scope a Penetration Testing Engagement Properly.mp4
01:00
12 - 2.4 Learning the Key Aspects of Compliance-based Assessments.mp4
01:00
13 - Module 2 - Introduction.mp4
00:26
14 - Learning objectives.mp4
00:38
15 - 3.1 Conducting Information Gathering and Reconnaissance.mp4
01:00
16 - 3.2 Performing Port Scanning.mp4
01:00
17 - 3.3 Performing and Analyzing Vulnerability Scans.mp4
01:00
18 - 3.4 Leveraging Reconnaissance Results to Prepare for the Exploitation Phase.mp4
01:00
19 - Module 3 - Introduction.mp4
00:35
20 - Learning objectives.mp4
00:43
21 - 4.1 Understanding Phishing and Spear Phishing Attacks.mp4
01:00
22 - 4.2 Understanding Pharming, Whaling, Malvertising, SMS Phishing, and Voice Phishing Attacks.mp4
01:00
23 - 4.3 Describing what is Elicitation, Interrogation, and Impersonation (Pretexting).mp4
01:00
24 - 4.4 Understanding What is Social Engineering Motivation Techniques.mp4
01:00
25 - 4.5 Understanding What is Shoulder Surfing.mp4
00:58
26 - 4.6 Understanding What is USB Key Drop.mp4
01:00
27 - Learning objectives.mp4
01:00
28 - 5.1 Exploiting Windows Name Resolution-based Vulnerabilities.mp4
01:00
29 - 5.2 Surveying DNS Cache Poisoning Attacks.mp4
01:00
30 - 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations.mp4
01:00
31 - 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits.mp4
01:00
32 - 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities.mp4
01:00
33 - 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities.mp4
01:00
34 - 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks.mp4
01:00
35 - 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks.mp4
01:00
36 - 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks.mp4
01:00
37 - 5.10 Understanding Rogue Access Points and Evil Twin Attacks.mp4
01:00
38 - 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists.mp4
01:00
39 - 5.12 Jamming Wireless Signal, Causing Interference, and War Driving.mp4
01:00
40 - 5.13 Understanding the WEP Protocol.mp4
01:00
41 - 5.14 Cracking WEP Implementations.mp4
01:00
42 - 5.15 Understanding the WPA Protocol.mp4
01:00
43 - 5.16 Attacking WPA2 Implementations.mp4
01:00
44 - Learning objectives.mp4
00:52
45 - 6.1 Overview of Web Applications for Security Professionals.mp4
01:00
46 - 6.2 How to Build Your Own Web Application Lab.mp4
01:00
47 - 6.3 Understanding SQL Injection.mp4
01:00
48 - 6.4 Understanding Injection Vulnerabilities.mp4
01:00
49 - 6.5 Exploiting Command Injection Vulnerabilities.mp4
01:00
50 - 6.6 Understanding Authentication-based Vulnerabilities.mp4
01:00
51 - 6.7 Exploiting Authorization-based Vulnerabilities.mp4
01:00
52 - 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities.mp4
01:00
53 - 6.9 Understanding Cross-site Request Forgery (CSRF XSRF).mp4
01:00
54 - 6.10 Understanding Clickjacking.mp4
01:00
55 - 6.11 Exploiting Insecure Direct Object References and Path Traversal.mp4
01:00
56 - 6.12 Assessing Unsecure Code Practices and APIs.mp4
01:00
57 - Learning objectives.mp4
00:16
58 - 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp4
00:48
59 - 7.2 Exploiting Insecure Service and Protocol Configurations.mp4
01:00
60 - 7.3 Understanding Local Privilege Escalation.mp4
01:00
61 - 7.4 Understanding Linux Permissions.mp4
01:00
62 - 7.5 Understanding SUID or SGID and Unix Programs.mp4
01:00
63 - 7.6 Exploiting Insecure SUDO Implementations.mp4
01:00
64 - 7.7 Understanding Ret2libc Attacks.mp4
01:00
65 - 7.8 Understanding Windows Privileges.mp4
01:00
66 - 7.9 Surveying Kerberoasting.mp4
01:00
67 - 7.10 Exploiting Other Windows-based Vulnerabilities.mp4
01:00
68 - 7.11 Understanding What Are Key Loggers.mp4
01:00
69 - 7.12 Understanding What Are Scheduled Tasks.mp4
00:56
70 - 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp4
01:00
71 - 7.14 Surveying Mobile Device Security.mp4
01:00
72 - 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp4
01:00
73 - Learning objectives.mp4
00:29
74 - 8.1 Maintaining Persistence After Compromising a System.mp4
01:00
75 - 8.2 Understanding How to Perform Lateral Movement and Pivoting.mp4
01:00
76 - 8.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engage.mp4
01:00
77 - Module 4 - Introduction.mp4
00:29
78 - Learning objectives.mp4
00:55
79 - 9.1 Understanding the Different Use Cases of Penetration Testing Tools.mp4
01:00
80 - 9.2 Exploring Tools for Reconnaissance.mp4
01:00
81 - 9.3 Exploring Tools for Vulnerability Scanning.mp4
01:00
82 - 9.4 Exploring Tools for Credential Attacks.mp4
01:00
83 - 9.5 Exploring Tools for Persistence.mp4
01:00
84 - 9.6 Exploring Tools for Evasion.mp4
01:00
85 - 9.7 Exploring Tools for De-compilation.mp4
01:00
86 - 9.8 Exploring Tools for Forensics.mp4
01:00
87 - 9.9 Exploring Tools for Software Assurance.mp4
01:00
88 - 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp4
01:00
89 - Learning objectives.mp4
00:37
90 - 10.1 Surveying Report Writing and Handling Best Practices.mp4
01:00
91 - 10.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4
01:00
92 - 10.3 Explaining the Importance of Appropriate Communication.mp4
01:00
93 - CompTIA PenTest+ (PT1-001) Complete Video Course - Summary.mp4
00:59
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 93
- duration 1:27:53
- Release Date 2023/11/03