CompTIA PenTest+: Prioritize & Prepare for Attacks
CompTIA PenTest+
| Intermediate
- 14 videos | 2h 21m 13s
- Earns a Badge
Prioritizing and preparing for penetration testing (pen testing) attacks involves several key steps to ensure a thorough and effective assessment of your system's security posture. In this course, explore target prioritization, capability selection steps, and various attack types. Next, learn how to use common tools to perform network attacks, including Metasploit, Netcat, Nmap, and Impacket. Finally, examine how to use the CrackMapExec tool, perform network analysis with Wireshark, generate custom payloads with MSFvenom, brute force passwords using Hydra, and perform poisoning attacks using Responder. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how to leverage high-value asset identification, descriptors and metrics, end of life systems, and default configurations during target prioritizationOutline tool selection, documentation, dependencies, and scope limitations while prioritizing and preparing for attacksDifferentiate between on-path, default credentials, vlan hopping, relay attacks, and packet crafting toolsUse metasploit to identify vulnerabilitiesPerform port scanning and port listening using netcatPerform network scans using nmap
-
Use impacket to access network packetsCollect active directory (ad) information using crackmapexecUse wireshark to perform network analysisPerform ethical hacking attacks using msfvenomBrute force passwords using hydra to gain access to a systemPerform poisoning attacks using the responder utilitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 24sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 57sThrough this video, you will be able to recognize how to leverage high-value asset identification, descriptors and metrics, end of life systems, and default configurations during target prioritization. FREE ACCESS
-
5m 48sUpon completion of this video, you will be able to outline tool selection, documentation, dependencies, and scope limitations while prioritizing and preparing for attacks. FREE ACCESS
-
9m 5sAfter completing this video, you will be able to differentiate between on-path, default credentials, VLAN hopping, relay attacks, and packet crafting tools. FREE ACCESS
-
9m 48sDiscover how to use Metasploit to identify vulnerabilities. FREE ACCESS
-
12m 7sIn this video, find out how to perform port scanning and port listening using Netcat. FREE ACCESS
-
18m 3sIn this video, you will learn how to perform network scans using Nmap. FREE ACCESS
-
12m 9sDuring this video, discover how to use Impacket to access network packets. FREE ACCESS
-
14m 33sFind out how to collect Active Directory (AD) information using CrackMapExec. FREE ACCESS
-
20m 44sIn this video, learn how to use Wireshark to perform network analysis. FREE ACCESS
-
10m 56sDiscover how to perform ethical hacking attacks using MSFvenom. FREE ACCESS
-
8m 29sLearn how to brute force passwords using Hydra to gain access to a system. FREE ACCESS
-
10m 11sIn this video, find out how to perform poisoning attacks using the Responder utility. FREE ACCESS
-
1m 1sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.