• No products in the basket.

  • LOGIN

Login

  • 4 Students

  • Certified

Learning Outcome

Overview

Discover the skills to become a “White Hat” and protect clients from IT data theft and malicious attacks with CompTIA PenTest+ (Ethical Hacking) training. Passing a CompTIA PenTest+ exam will prove your ability to find vulnerabilities in a computer system or network and report them to grateful clients. You can embody the values and skills of a professional, ethical hacker with this course and provide yourself with a fascinating and exciting career path for the future.   

This CompTIA PenTest+ tutorial focuses on the fundamental techniques and knowledge that is needed to perform effective “penetration testing” on an IT infrastructure. You will be shown how to plan and scope a pen test, survey targets, select tools, and provide comprehensive reports of the outcomes. During each module, you will be given expert tips on gathering data intelligence and exploiting identified weaknesses. As the IT world becomes more policed, make sure you’re on the right side with bright future prospects by enrolling now. 

Course design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Will I receive a certificate of completion?

Upon successful completion, you will qualify for the UK and internationally-recognised CPD accredited certification. You can choose to make your achievement formal by obtaining your PDF Certificate at the cost of £9 and Hard Copy Certificate for £15.

Why study this course

It doesn’t matter if you are an aspiring professional or absolute beginner; this course will enhance your expertise and boost your CV with critical skills and an accredited certification attesting to your knowledge.

The CompTIA PenTest+ (Ethical Hacking) is fully available to anyone, and no previous qualifications are needed to enrol. All One Education needs to know is that you are eager to learn and are over 16.

Course Curriculum

Section 01: Introduction
Introduction 00:09:00
Section 02: Planning and Scoping
Planning a Pen Test 00:09:00
Rules of Engagement 00:11:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Scope Considerations 00:11:00
Lab Environment Setup 00:23:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:14:00
Compliance-Based Assessments 00:05:00
Section 03: Surveying the Target
Scanning and Enumeration 00:05:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Application and Open-Source Resources 00:12:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:17:00
Target Considerations 00:16:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Credential Attacks 00:15:00
Weaknesses in Specialized Systems 00:18:00
Section 04: Select Your Attack Vector
Remote Social Engineering 00:07:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Wireless Exploits 00:14:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Code Vulnerabilities 00:17:00
Local Host Vulnerabilities 00:05:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Physical Security 00:11:00
Post-Exploitation Techniques 00:11:00
Persistence and Stealth 00:11:00
Section 05: Selecting Pen Testing Tools
Nmap Scoping & Output Options 00:21:00
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:06:00
Scanners & Credential Tools 00:10:00
Code-Cracking Tools 00:05:00
Open-Source Research Tools 00:07:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:03:00
Other Pen Testing Tools 00:05:00
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Section 06: Reporting and Communication
Writing Reports 00:16:00
Post-Report Activities 00:06:00
Mitigation Strategies 00:05:00
Communication 00:10:00

Certifications

Get accredited certificates

New skills

Add skills to your CV

Exams

Test your skills

Dedicated Support

For any questions

Set your own speed

Self-paced learning

Save your money

Monthly subscription

COPYRIGHT © 2021 One Education

0
Your Cart