• LOGIN
  • No products in the basket.

Popular Courses

Brand Brand Brand Brand

Overview

By enroling in CompTIA PenTest+ (Ethical Hacking), you can kickstart your vibrant career and strengthen your profound knowledge. You can learn everything you need to know about the topic.

The CompTIA PenTest+ (Ethical Hacking) course includes all of the most recent information to keep you abreast of the employment market and prepare you for your future. The curriculum for this excellent CompTIA PenTest+ (Ethical Hacking) course includes modules at all skill levels, from beginner to expert. You will have the productivity necessary to succeed in your organisation once you have completed our CompTIA PenTest+ (Ethical Hacking) Program.

So enrol in our CompTIA PenTest+ (Ethical Hacking) course right away if you’re keen to envision yourself in a rewarding career.

Description

Enroling in this CompTIA PenTest+ (Ethical Hacking) course can improve your CompTIA PenTest+ (Ethical Hacking) perspective, regardless of your skill levels in the CompTIA PenTest+ (Ethical Hacking) topics you want to master. If you’re already a CompTIA PenTest+ (Ethical Hacking) expert, this peek under the hood will provide you with suggestions for accelerating your learning, including advanced CompTIA PenTest+ (Ethical Hacking) insights that will help you make the most of your time. This CompTIA PenTest+ (Ethical Hacking) course will act as a guide for you if you’ve ever wished to excel at CompTIA PenTest+ (Ethical Hacking).

Why Choose Us?​​

Certificate of Achievement

Upon successful completion, you will qualify for the UK and internationally-recognised CPD certificate and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £4.99 and Hardcopy Certificate for £9.99.

Who Is This Course For?​

This CompTIA PenTest+ (Ethical Hacking) course is a great place to start if you’re looking to start a new career in CompTIA PenTest+ (Ethical Hacking) field. This training is for anyone interested in gaining in-demand CompTIA PenTest+ (Ethical Hacking) proficiency to help launch a career or their business aptitude. 

Requirements​

The CompTIA PenTest+ (Ethical Hacking) course requires no prior degree or experience. All you require is English proficiency, numeracy literacy and a gadget with stable internet connection. Learn and train for a prosperous career in the thriving and fast-growing industry of CompTIA PenTest+ (Ethical Hacking), without any fuss.

Career Path​

This CompTIA PenTest+ (Ethical Hacking) training will assist you develop your CompTIA PenTest+ (Ethical Hacking) ability, establish a personal brand, and present a portfolio of relevant talents. It will help you articulate a  CompTIA PenTest+ (Ethical Hacking) professional story and personalise your path to a new career. Furthermore, developing this CompTIA PenTest+ (Ethical Hacking) skillset can lead to numerous opportunities for high-paying jobs in a variety of fields.

Order Your Certificate

Course Curriculum

Section 01: Introduction
Introduction 00:09:00
Section 02: Planning And Scoping
Planning a Pen Test 00:09:00
Rules of Engagement 00:11:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Scope Considerations 00:11:00
Lab Environment Setup 00:23:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:14:00
Compliance-Based Assessments 00:05:00
Section 03: Surveying The Target
Scanning and Enumeration 00:05:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Application and Open-Source Resources 00:12:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:17:00
Target Considerations 00:16:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Credential Attacks 00:15:00
Weaknesses in Specialized Systems 00:18:00
Section 04: Select Your Attack Vector
Remote Social Engineering 00:06:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Wireless Exploits 00:14:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Code Vulnerabilities 00:17:00
Local Host Vulnerabilities 00:05:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Physical Security 00:11:00
Post-Exploitation Techniques 00:11:00
Persistence and Stealth 00:11:00
Section 05: Selecting Pen Testing Tools
Nmap Scoping & Output Options 00:21:00
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:21:00
Scanners & Credential Tools 00:07:00
Code-Cracking Tools 00:05:00
Open-Source Research Tools 00:07:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:03:00
Other Pen Testing Tools 00:05:00
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Section 06: Reporting And Communication
Writing Reports 00:16:00
Post-Report Activities 00:06:00
Mitigation Strategies 00:05:00
Communication 00:10:00
Order Your Certificate
Order Your Certificate 00:00:00

Related Courses

A product of

© 2024 NextGen. All rights reserved

Home Search Cart Offers
Select your currency
USD United States (US) dollar
0
    0
    Your Cart
    Your cart is emptyReturn to Course
      Apply Coupon