TOTAL CompTIA PenTest Ethical Hacking
Master penetration testing and ethical hacking with the TOTAL CompTIA PenTest+ certification to assess and secure networks effectively
1 - Introduction to the CompTIA PenTest PT0002 Course
2 - About the CompTIA PenTest PT0002 Exam
3 - Planning a Pen Test
4 - Rules of Engagement
5 - Regulatory Compliance
6 - Resources and Budget
7 - Impact and Constraints
8 - Support Resources
9 - Legal Groundwork
10 - Service Provider Agreements
11 - Standards and Methodologies Part 1
12 - Standards and Methodologies Part 2
13 - Environmental and Scoping Considerations
14 - Ethical Mindset
15 - Lab Environment Setup
16 - Project Strategy and Risk
17 - Scope Vulnerabilities
18 - Compliance
19 - Scanning and Enumeration
20 - Scanning Demo
21 - Packet Investigation
22 - Packet Inspection Demo
23 - Labtainers Setup
24 - Labtainers Lab Wireshark
25 - Application and Open
26 - Passive Reconnaissance
27 - Active Reconnaissance
28 - Vulnerability Scanning
29 - Vulnerability Scanning Demo
30 - Labtainers Lab Network Basics
31 - Labtainers Lab Nmap Discovery
32 - Target Considerations
33 - Analyzing Scan Output
34 - Nmap Scoping and Output Options
35 - Nmap Timing and Performance Options
36 - Prioritization of Vulnerabilities
37 - Common Attack Techniques
38 - Automating Vulnerability Scans
39 - Credential Attacks
40 - Labtainers Lab Password Cracking
41 - Labtainers Lab Secure Socket Layers
42 - Labtainers Lab Routing Basics
43 - Exploit Resources and Network Attacks
44 - Network
45 - FTP Exploit Demo
46 - Man
47 - Labtainers Lab TCPIP Attacks
48 - Labtainers Lab ARP Spoof Attacks
49 - Labtainers Lab Local DNS Attacks
50 - Labtainers Lab MACs and Hash Functions
51 - Wireless Exploits
52 - Wireless Exploits Part 2
53 - Antennas
54 - OWASP Top 10
55 - Application Exploits Part 1
56 - SQL Injection Demo
57 - Labtainers Lab SQL Injection
58 - Application Exploits Part 2
59 - Application Exploits Part 3
60 - Cross
61 - Labtainers Lab CrossSite Scripting
62 - Labtainers Lab Cross
63 - Code Vulnerabilities
64 - API Attacks and Attack Resources
65 - Privilege Escalation Linux
66 - Privilege Escalation Windows
67 - Misc Privilege Escalation
68 - Misc Local Host Vulnerabilities
Don’t miss out on this opportunity to upskill with Learn Ezy!
Add your email to the mailing list to get the latest updates.