CompTIA PenTest+: Discovering & Analyzing Vulnerabilities
CompTIA PenTest+
| Intermediate
- 13 videos | 1h 9m 15s
- Earns a Badge
Penetration testing (pen testing) involves simulating real-world cyberattacks on a computer system, network, or application to identify security vulnerabilities that could be exploited by malicious actors. The discovery and analysis of vulnerabilities are critical steps in this process. In this course, explore how to conduct vulnerability discovery using various techniques, including container, application, and network scanning. Next, learn about common vulnerability discovery tools and how to conduct vulnerability discovery on industrial control systems (ICS). Finally, discover how to analyze output from reconnaissance, scanning, and enumeration phases, as well as common security concepts including tailgating, site surveys, universal serial bus (USB) drops, badge cloning, and lock picking. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiation between vulnerability scans, including container, application, and network scansIdentify manual assessments and port mirroring techniques for dealing with industrial control systems (ics)Outline vulnerability discovery and analysis tools, including nikto, trufflehog, grype, and kube-hunterRecognize how to validate scan, reconnaissance, and enumeration resultsDescribe how to analyze public exploitsUse scripting to validate vulnerability discovery and analysis results
-
Identify the key concepts of tailgating attacksDescribe how site surveys can lead to security vulnerabilitiesRecognize the dangers of universal serial bus (usb) dropsOutline the key concepts of security badge cloning threatsIdentify the threats posed by security lock pickingsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 17sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 18sAfter completing this video, you will be able to differentiation between vulnerability scans, including container, application, and network scans. FREE ACCESS
-
6m 47sUpon completion of this video, you will be able to identify manual assessments and port mirroring techniques for dealing with industrial control systems (ICS). FREE ACCESS
-
6m 27sIn this video, we will outline vulnerability discovery and analysis tools, including Nikto, TruffleHog, Grype, and kube-hunter. FREE ACCESS
-
5m 59sThrough this video, you will be able to recognize how to validate scan, reconnaissance, and enumeration results. FREE ACCESS
-
6m 16sAfter completing this video, you will be able to describe how to analyze public exploits. FREE ACCESS
-
6m 41sDuring this video, discover how to use scripting to validate vulnerability discovery and analysis results. FREE ACCESS
-
5m 32sUpon completion of this video, you will be able to identify the key concepts of tailgating attacks. FREE ACCESS
-
6m 17sIn this video, we will describe how site surveys can lead to security vulnerabilities. FREE ACCESS
-
5m 41sThrough this video, you will be able to recognize the dangers of universal serial bus (USB) drops. FREE ACCESS
-
5m 36sAfter completing this video, you will be able to outline the key concepts of security badge cloning threats. FREE ACCESS
-
5m 37sUpon completion of this video, you will be able to identify the threats posed by security lock pickings. FREE ACCESS
-
46sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.