CompTIA PenTest Complete Course – FREE [11 hours] PT0-002

CompTIA PenTest Complete Course – FREE [11 hours] PT0-002

HomehowtonetworkCompTIA PenTest Complete Course – FREE [11 hours] PT0-002
CompTIA PenTest Complete Course – FREE [11 hours] PT0-002
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
A complete CompTIA PentTest course with theory and practical exercises.

Cybersecurity Tutorial
The 10 most important cybersecurity certifications
Information technology, IT jobs
How to get started with cybersecurity and coding

Buy the lab book on Amazon – https://amzn.to/3iJyGG1

Join us ️ www.howtonetwork.com

Use this special URL to get 30 days access for 1 –

https://www.howtonetwork.com/youtube

Here is the 101 Labs website with lab courses, mock exams, and live Cisco Racks for members.

https://www.101labs.net

Use the coupon code “Youtube” for the offer.

#pentester #cybersecurity #comptia

00:00:00 – The CompTIA Pentest Exam
00:11:27 – Pentesting

Module 2 – Planning and Scope

00:37:20 – Explain the importance of planning an engagement.
01:28:06 – Explaining important legal concepts

Module 3 – Information gathering

01:48:55 – Passive information gathering, reconnaissance and enumeration
02:07:52 – Tools for passive information gathering
02:29:31 – Reconnaissance tools

Module 4 – Vulnerability Scan

03:04:28 – Vulnerability management
03:22:14 – Tools for scanning vulnerabilities

Module 5 – Vulnerability Analysis

04:11:19 – Interpreting vulnerability reports

Module 6 – Exploits

04:55:40 – Exploit types
05:20:37 – Metasploitable and Exploits DBs
05:32:37 – The Metasploit Framework

Module 7 – Using networks

05:54:22 – Network exploits
06:27:42 – NetBIOS exploits
06:38:58 – Wireless network exploits
06:50:38 – Some network exploitation tools

Module 8 – Exploiting people

07:15:41 – Social Engineering
07:34:00 – Social Engineering Toolkit

Module 9 – Using applications

07:49:27 – Exploiting applications
08:24:18 – Injection tools

Module 10 – Exploiting Hosts

08:41:13 – Special permission bits in Linux
09:08:11 – Exploiting Windows hashes and kernel
09:35:27 – Exploiting the Linux kernel

Module 11 – Using and Writing Pentesting Scripts

10:02:15 – Scripting in Bash, Powershell, Python and Ruby

Module 12 – Reporting

10:53:21 – Reporting and monitoring

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.