CompTIA PenTest+: Moving Laterally Throughout the Environment

CompTIA PenTest+    |    Intermediate
  • 9 videos | 47m 9s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
In a penetration testing (pen testing) context, moving laterally refers to the act of navigating from one system or network segment to another within a target organization's infrastructure after gaining initial access. In this course, explore techniques such as pivoting, SMB relaying, enumeration, and service discovery, as well as how they are used to move laterally once inside a compromised environment. Next, learn how to move laterally using both Windows Management Instrumentation (WMI) and Windows Remote Management (WinRM). Finally, compare the tools used to facilitate lateral movement throughout a compromised network. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how pivoting can be used to spread between different computer systems once inside a network
    Outline how server message block (smb) relaying can be used to move laterally throughout the environment
    Recognize how enumeration techniques can be used to move laterally throughout a network
    List different services that can potentially be exploited
  • Describe how windows management instrumentation (wmi) can be used to move laterally within an environment
    Outline how windows remote management (winrm) can be leveraged to move laterally within an environment
    Differentiate between the tools used to facilitate lateral movement throughout a compromised network
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 14s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 10s
    After completing this video, you will be able to identify how pivoting can be used to spread between different computer systems once inside a network. FREE ACCESS
  • Locked
    3.  Server Message Block (SMB) Relaying
    6m 33s
    Upon completion of this video, you will be able to outline how Server Message Block (SMB) relaying can be used to move laterally throughout the environment. FREE ACCESS
  • Locked
    4.  Enumeration Techniques
    6m 36s
    Through this video, you will be able to recognize how enumeration techniques can be used to move laterally throughout a network. FREE ACCESS
  • Locked
    5.  Service Discovery
    6m 55s
    After completing this video, you will be able to list different services that can potentially be exploited. FREE ACCESS
  • Locked
    6.  Lateral Movement with Windows Management Instrumentation (WMI)
    6m 17s
    In this video, we will describe how Windows Management Instrumentation (WMI) can be used to move laterally within an environment. FREE ACCESS
  • Locked
    7.  Lateral Movement with Windows Remote Management (WinRM)
    5m 37s
    Upon completion of this video, you will be able to outline how Windows Remote Management (WinRM) can be leveraged to move laterally within an environment. FREE ACCESS
  • Locked
    8.  Tools Used for Lateral Movement
    7m 8s
    Through this video, you will be able to differentiate between the tools used to facilitate lateral movement throughout a compromised network. FREE ACCESS
  • Locked
    9.  Course Summary
    39s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 13 users Rating 4.6 of 13 users (13)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)