CompTIA PenTest+ (PT0-001)
(PT0-001) / ISBN : 978-1-64459-084-3
About This Course
Gain hands-on experience to pass the PT0-001 exam with the CompTIA PenTest+ PT0-001 course and lab. The lab is a simulator that provides a virtual environment for users to explore and learn. The CompTIA PenTest+ study guide covers the PT0-001 exam objectives and knowledge to exploit network, wireless, application, and RF-based vulnerabilities; summarize physical security attacks and perform post-exploitation techniques, and many more.
Skills You’ll Get
CompTIA PenTest+ certification ensures that the successful candidate has the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results. The CompTIA PenTest+ PT0-001 certification explains the importance of planning and key aspects of compliance-based assessments.
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
14+ Interactive Lessons | 274+ Quizzes | 75+ Flashcards | 75+ Glossary of terms
Gamified TestPrep
80+ Pre Assessment Questions | 2+ Full Length Tests | 80+ Post Assessment Questions | 160+ Practice Test Questions
Hands-On Labs
54+ LiveLab | 55+ Video tutorials | 00+ Minutes
Video Lessons
192+ Videos | 07:26+ Hours
Introduction
- CompTIA
- The PenTest+ Exam
- What Does This Course Cover?
- CompTIA PenTest+ Certification Exam Objectives
Penetration Testing
- What Is Penetration Testing?
- Reasons for Penetration Testing
- Who Performs Penetration Tests?
- The CompTIA Penetration Testing Process
- The Cyber Kill Chain
- Tools of the Trade
- Summary
- Exam Essentials
- Lab Exercises
Planning and Scoping Penetration Tests
- Scoping and Planning Engagements
- Key Legal Concepts for Penetration Tests
- Understanding Compliance-Based Assessments
- Summary
- Exam Essentials
- Lab Exercises
Information Gathering
- Footprinting and Enumeration
- Active Reconnaissance and Enumeration
- Information Gathering and Defenses
- Summary
- Exam Essentials
- Lab Exercises
Vulnerability Scanning
- Identifying Vulnerability Management Requirements
- Configuring and Executing Vulnerability Scans
- Software Security Testing
- Developing a Remediation Workflow
- Overcoming Barriers to Vulnerability Scanning
- Summary
- Exam Essentials
- Lab Exercises
Analyzing Vulnerability Scans
- Reviewing and Interpreting Scan Reports
- Validating Scan Results
- Common Vulnerabilities
- Summary
- Exam Essentials
- Lab Exercises
Exploit and Pivot
- Exploits and Attacks
- Exploitation Toolkits
- Exploit Specifics
- Leveraging Exploits
- Persistence and Evasion
- Pivoting
- Covering Your Tracks
- Summary
- Exam Essentials
- Lab Exercises
Exploiting Network Vulnerabilities
- Conducting Network Exploits
- Exploiting Windows Services
- Exploiting Common Services
- Wireless Exploits
- Summary
- Exam Essentials
- Lab Exercises
Exploiting Physical and Social Vulnerabilities
- Physical Facility Penetration Testing
- Social Engineering
- Summary
- Exam Essentials
- Lab Exercises
Exploiting Application Vulnerabilities
- Exploiting Injection Vulnerabilities
- Exploiting Authentication Vulnerabilities
- Exploiting Authorization Vulnerabilities
- Exploiting Web Application Vulnerabilities
- Unsecure Coding Practices
- Application Testing Tools
- Summary
- Exam Essentials
- Lab Exercises
Exploiting Host Vulnerabilities
- Attacking Hosts
- Remote Access
- Attacking Virtual Machines and Containers
- Physical Device Security
- Attacking Mobile Devices
- Credential Attacks
- Summary
- Exam Essentials
- Lab Exercises
Scripting for Penetration Testing
- Scripting and Penetration Testing
- Variables, Arrays, and Substitutions
- Comparison Operations
- String Operations
- Flow Control
- Input and Output (I/O)
- Error Handling
- Summary
- Exam Essentials
- Lab Exercises
Reporting and Communication
- The Importance of Communication
- Recommending Mitigation Strategies
- Writing a Penetration Testing Report
- Wrapping Up the Engagement
- Summary
- Exam Essentials
- Lab Exercises
Appendix: Video Tutorials
Planning and Scoping Penetration Tests
- Studying SOW, MSA, and NDA
Information Gathering
- Examining Penetration Testing Execution Standard (PTES)
- Examining Open Source Security Testing Methodology Manual
- Examining NIST SP 800-115 - Technical Guide to Information Security Testing and Assessment
- Performing Domain Enumeration
- Performing Zone Transfer Using dig
- Using ExifTool
- Using the theHarvester Tool
- Using Maltego to Gather Information
- Studying the Communication Plan and the Main Elements of a Pen Test Report
- Performing Nmap SYN Scan
- Performing a UDP Scan Using Nmap
- Using Nmap for Host Enumeration
- Using Nmap for User Enumeration
- Using Nmap for Network Share Enumeration
- Using Nmap for Web Application Enumeration
- Using Nmap for Network Enumeration
- Using the Zenmap Tool
- Using nslookup
Vulnerability Scanning
- Examining the OWASP Web Testing Methodologies and Testing Guide
- Using Nikto
Analyzing Vulnerability Scans
- Studying CVSS Exercises with the CVSS Calculator
Exploit and Pivot
- Searching Exploits Using searchsploit
- Using OpenVAS
- Using meterpreter
- Exploiting SMB
- Using the Metasploit RDP Post-Exploitation Module
- Using the SET Tool
Exploiting Network Vulnerabilities
- Performing ARP Spoofing
- Performing the Man-in-the-Middle Attack
- Using the EternalBlue Exploit in Metasploit
- Exploiting SNMP
- Exploiting SMTP
Exploiting Application Vulnerabilities
- Exploiting SQL Injection Vulnerabilities
- Exploiting Blind SQL Injection Vulnerabilities
- Exploiting Command Injection Vulnerabilities
- Understanding Credential based Brute-force Attack
- Performing Session Hijacking
- Exploiting Local File Inclusion Vulnerabilities
- Exploiting Remote File Inclusion Vulnerabilities
- Exploiting the Stored (Persistent) XSS Attack
- Exploiting the DOM-Based XSS Attack
- Exploiting the Reflected XSS Attack
- Exploiting the Cross-site Request Forgery (CSRF or XSRF) Attacks
- Using OWASP ZAP
Exploiting Host Vulnerabilities
- Understanding the Pass-the-hash Attack
- Understanding SUID or SGID and Unix Program
- Understanding Local Privilege Escalation
- Exploiting SAM Database
- Creating Reverse and Bind Shells using Netcat
- Using Apktool to Decode and Analyze apk File
Scripting for Penetration Testing
- Using Bash for Penetration Testing
- Using Python for Penetration Testing
- Using PowerShell for Penetration Testing
Why Do Learners Love This Course?
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowNetwork+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
USD 370
Performance-based and multiple choice
The exam contains 85 questions.
165 minutes
750
(on a scale of 100-900)
In the event that you fail your first attempt at passing the PenTest+ examination, CompTIA's retake policies are:
- If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
- Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
- A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
- CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least 14 calendar days from the date of your last attempt before you can retake the exam.
CompTIA PenTest+ certification expires after three years from the date of issue, after which the certification holder will need to renew their certification via CompTIA's Continuing Education Program.