Why Choose Us?

  • Best Seller

  • Online Courses

  • 24/7 Support

  • Lifetime Access

  • Get Certificate

Course curriculum

    1. 1 - Introduction to the CompTIA PenTest PT0002 Course

    2. 2 - About the CompTIA PenTest PT0002 Exam

    1. 3 - Planning a Pen Test

    2. 4 - Rules of Engagement

    3. 5 - Regulatory Compliance

    4. 6 - Resources and Budget

    5. 7 - Impact and Constraints

    6. 8 - Support Resources

    7. 9 - Legal Groundwork

    8. 10 - Service Provider Agreements

    9. 11 - Standards and Methodologies Part 1

    10. 12 - Standards and Methodologies Part 2

    11. 13 - Environmental and Scoping Considerations

    12. 14 - Ethical Mindset

    13. 15 - Lab Environment Setup

    14. 16 - Project Strategy and Risk

    15. 17 - Scope Vulnerabilities

    16. 18 - Compliance

    1. 19 - Scanning and Enumeration

    2. 20 - Scanning Demo

    3. 21 - Packet Investigation

    4. 22 - Packet Inspection Demo

    5. 23 - Labtainers Setup

    6. 24 - Labtainers Lab Wireshark

    7. 25 - Application and Open

    8. 26 - Passive Reconnaissance

    9. 27 - Active Reconnaissance

    10. 28 - Vulnerability Scanning

    11. 29 - Vulnerability Scanning Demo

    12. 30 - Labtainers Lab Network Basics

    13. 31 - Labtainers Lab Nmap Discovery

    14. 32 - Target Considerations

    15. 33 - Analyzing Scan Output

    16. 34 - Nmap Scoping and Output Options

    17. 35 - Nmap Timing and Performance Options

    18. 36 - Prioritization of Vulnerabilities

    19. 37 - Common Attack Techniques

    20. 38 - Automating Vulnerability Scans

    21. 39 - Credential Attacks

    22. 40 - Labtainers Lab Password Cracking

    23. 41 - Labtainers Lab Secure Socket Layers

    24. 42 - Labtainers Lab Routing Basics

    1. 43 - Exploit Resources and Network Attacks

    2. 44 - Network

    3. 45 - FTP Exploit Demo

    4. 46 - Man

    5. 47 - Labtainers Lab TCPIP Attacks

    6. 48 - Labtainers Lab ARP Spoof Attacks

    7. 49 - Labtainers Lab Local DNS Attacks

    8. 50 - Labtainers Lab MACs and Hash Functions

    1. 51 - Wireless Exploits

    2. 52 - Wireless Exploits Part 2

    3. 53 - Antennas

    1. 54 - OWASP Top 10

    2. 55 - Application Exploits Part 1

    3. 56 - SQL Injection Demo

    4. 57 - Labtainers Lab SQL Injection

    5. 58 - Application Exploits Part 2

    6. 59 - Application Exploits Part 3

    7. 60 - Cross

    8. 61 - Labtainers Lab CrossSite Scripting

    9. 62 - Labtainers Lab Cross

    10. 63 - Code Vulnerabilities

    11. 64 - API Attacks and Attack Resources

    12. 65 - Privilege Escalation Linux

    13. 66 - Privilege Escalation Windows

    14. 67 - Misc Privilege Escalation

    15. 68 - Misc Local Host Vulnerabilities

About this course

  • $59.00
  • 121 lessons
  • 14.5 hours of video content

Discover your potential, starting today

Hurry! This Exclusive Deal Ends In

Don’t miss out on this opportunity to upskill with Learn Ezy!

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Get In Touch

Add your email to the mailing list to get the latest updates.

Thank You