CompTIA PenTest+: Information Gathering

Intermediate
  • 12 videos | 52m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 20 users Rating 4.4 of 20 users (20)
Discover how to gather information and perform white hat reconnaissance through scanning, enumeration, fingerprinting, and eavesdropping. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. Among the topics covered you will explore how to leverage data to prepare for exploitation. Learn about packet crafting, packet and certificate inspection, decompilation, debugging, open-source intelligence collection, and how to map and prioritize potential intruders. Identify common attack techniques. Conclude with an exercise to name five of the OWASP Top 10 for 2017, list five certificate inspection issues and common enumeration types, and list three UNIX/Linux enumeration tools.

WHAT YOU WILL LEARN

  • Describe scanning
    Describe enumeration
    Compare packet crafting and inspection
    Conduct fingerprinting
    Inspect x509v3 certificates
    Perform eavesdropping
  • Describe decompilation
    Conduct debugging
    Describe open source intelligence gathering
    Describe mapping and prioritizing
    Describe common techniques to complete an attack
    Describe information gathering and preparation

IN THIS COURSE

  • 9m 40s
    Upon completion of this video, you will be able to describe scanning. FREE ACCESS
  • 6m 23s
    After completing this video, you will be able to describe enumeration. FREE ACCESS
  • Locked
    3.  Packet Crafting and Packet Inspection
    2m 48s
    Learn how to compare packet crafting and inspection. FREE ACCESS
  • Locked
    4.  Fingerprinting
    3m 46s
    During this video, you will learn how to take fingerprints. FREE ACCESS
  • Locked
    5.  Certificate Inspection
    2m 51s
    Learn how to inspect X.509v3 certificates. FREE ACCESS
  • Locked
    6.  Eavesdropping
    2m 14s
    During this video, you will learn how to eavesdrop. FREE ACCESS
  • Locked
    7.  Decompilation
    1m 45s
    Upon completion of this video, you will be able to describe decompilation. FREE ACCESS
  • Locked
    8.  Debugging
    1m 43s
    Learn how to debug. FREE ACCESS
  • Locked
    9.  Open Source Intelligence Gathering
    9m 48s
    Upon completion of this video, you will be able to describe open source intelligence gathering. FREE ACCESS
  • Locked
    10.  Mapping and Prioritizing
    2m 37s
    Upon completion of this video, you will be able to describe mapping and prioritizing processes. FREE ACCESS
  • Locked
    11.  Common Techniques to Complete Attacks
    6m 6s
    After completing this video, you will be able to describe common techniques for carrying out an attack. FREE ACCESS
  • Locked
    12.  Exercise: Information Gathering and Preparation
    2m 47s
    After completing this video, you will be able to describe information gathering and preparation. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.3 of 127 users Rating 4.3 of 127 users (127)