CompTIA PenTest+ Cert Guide (PT0-002)
Enroll for our CompTIA Pentest+ training course which is perfectly aligned with the PT0-002 exam objective to help you pass the certification.
(PT0-002.AB1) / ISBN : 978-1-64459-340-0About This Course
Skills You’ll Get
- Understand ethical hacking and penetration testing
- Considering legal and ethical ways for penetration testing.
- Performing passive and active reconnaissance techniques to gather information about a target system.
- Using tools like Nmap and Zenmap for network enumeration
- Conduct network attacks like XSS attacks, ARP spoofing, and DDoS attacks.
- Execute vulnerability scans with Nessus and OpenVAS.
- Exploit vulnerabilities in web applications with SQL injection & command injection.
- Perform vulnerability scan results to prioritize targets.
- Workflow for vulnerability remediation.
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
11+ Interactive Lessons | 423+ Exercises | 117+ Quizzes | 200+ Flashcards | 200+ Glossary of terms
Gamified TestPrep
85+ Pre Assessment Questions | 2+ Full Length Tests | 85+ Post Assessment Questions | 170+ Practice Test Questions
Hands-On Labs
46+ LiveLab | 42+ Video tutorials | 01:34+ Hours
Introduction
- The Goals of the CompTIA PenTest+ Certification
- The Exam Objectives (Domains)
- Steps to Earning the PenTest+ Certification
- Facts About the PenTest+ Exam
- About the CompTIA PenTest+ PT0-002 Cert Guide
Introduction to Ethical Hacking and Penetration Testing
- Understanding Ethical Hacking and Penetration Testing
- Exploring Penetration Testing Methodologies
- Building Your Own Lab
- Review All Key Topics
Planning and Scoping a Penetration Testing Assessment
- Comparing and Contrasting Governance, Risk, and Compliance Concepts
- Explaining the Importance of Scoping and Organizational or Customer Requirements
- Demonstrating an Ethical Hacking Mindset by Maintaining Professionalism and Integrity
- Review All Key Topics
Information Gathering and Vulnerability Scanning
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Understanding the Art of Performing Vulnerability Scans
- Understanding How to Analyze Vulnerability Scan Results
- Review All Key Topics
Social Engineering Attacks
- Pretexting for an Approach and Impersonation
- Social Engineering Attacks
- Physical Attacks
- Social Engineering Tools
- Methods of Influence
- Review All Key Topics
Exploiting Wired and Wireless Networks
- Exploiting Network-Based Vulnerabilities
- Exploiting Wireless Vulnerabilities
- Review All Key Topics
Exploiting Application-Based Vulnerabilities
- Overview of Web Application-Based Attacks for Security Professionals and the OWASP Top 10
- How to Build Your Own Web Application Lab
- Understanding Business Logic Flaws
- Understanding Injection-Based Vulnerabilities
- Exploiting Authentication-Based Vulnerabilities
- Exploiting Authorization-Based Vulnerabilities
- Understanding Cross-Site Scripting (XSS) Vulnerabilities
- Understanding Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery Attacks
- Understanding Clickjacking
- Exploiting Security Misconfigurations
- Exploiting File Inclusion Vulnerabilities
- Exploiting Insecure Code Practices
- Review All Key Topics
Cloud, Mobile, and IoT Security
- Researching Attack Vectors and Performing Attacks on Cloud Technologies
- Explaining Common Attacks and Vulnerabilities Against Specialized Systems
- Review All Key Topics
Performing Post-Exploitation Techniques
- Creating a Foothold and Maintaining Persistence After Compromising a System
- Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration
- Review All Key Topics
Reporting and Communication
- Comparing and Contrasting Important Components of Written Reports
- Analyzing the Findings and Recommending the Appropriate Remediation Within a Report
- Explaining the Importance of Communication During the Penetration Testing Process
- Explaining Post-Report Delivery Activities
- Review All Key Topics
Tools and Code Analysis
- Understanding the Basic Concepts of Scripting and Software Development
- Understanding the Different Use Cases of Penetration Testing Tools and Analyzing Exploit Code
- Review All Key Topics
Information Gathering and Vulnerability Scanning
- Performing Zone Transfer Using dig
- Using dnsrecon
- Using Recon-ng to Gather Information
- Performing Reconnaissance on a Network
- Performing a UDP Scan Using Nmap
- Using Nmap for User Enumeration
- Using Nmap for Network Enumeration
- Performing Nmap SYN Scan
- Conducting Vulnerability Scanning Using Nessus
Social Engineering Attacks
- Using BeEF
- Using SET Tool to Plan an Attack
Exploiting Wired and Wireless Networks
- Using the EternalBlue Exploit in Metasploit
- Simulating the DDoS Attack
- Performing a DHCP Starvation Attack
- Understanding the Pass-the-hash Attack
- Performing ARP Spoofing
- Exploiting SMTP
- Exploiting SNMP
- Searching Exploits Using searchsploit
- Exploiting SMB
Exploiting Application-Based Vulnerabilities
- Conducting a Cross Site Scripting (XXS) attack
- Using curl to Make the HTTP GET Request
- Capturing Network Packets Using tcpdump
- Exploiting Command Injection Vulnerabilities
- Exploiting a Website Using SQL Injection
- Performing Session Hijacking Using Burp Suite
- Cracking Passwords
- Conducting a Cross-Site Request Forgery Attack
Cloud, Mobile, and IoT Security
- Understanding Local Privilege Escalation
Performing Post-Exploitation Techniques
- Using OWASP ZAP
- Using the Task Scheduler
- Writing Bash Shell Script
- Performing a Scan in Zenmap
- Using dig and nslookup Commands
- Creating Reverse and Bind Shells Using Netcat
- Hiding Text Using Steganography
- Using the Metasploit RDP Post-Exploitation Module
Tools and Code Analysis
- Finding Live Hosts by Using the Ping Sweep in Python
- Whitelisting an IP Address in the Windows Firewall
- Viewing Exploits Written in Perl
- Viewing the Effects of Hostile JavaScript in the Browser
- Using Meterpreter to Display the System Information
- Performing Vulnerability Scanning Using OpenVAS
- Enumerating Data Using enum4linux
- Using Maltego to Gather Information
- Cracking a Linux Password Using John the Ripper
Any questions?
Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowIt is a prestigious certification offered by CompTIA that demonstrates your competence in the ethical hacking methodology and the skills to effectively pen-test an environment.
It is the current version of compTIA PenTest+ exam. It focuses on the best practices and latest tools used in penetration testing.
The average annual income of a CompTIA PenTest+ certified professional is USD 104, 000.
The exam cost for this certification is USD 404.