CompTIA PenTest+: Prioritize & Prepare for Attacks

CompTIA PenTest+    |    Intermediate
  • 14 videos | 2h 21m 13s
  • Earns a Badge
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Prioritizing and preparing for penetration testing (pen testing) attacks involves several key steps to ensure a thorough and effective assessment of your system's security posture. In this course, explore target prioritization, capability selection steps, and various attack types. Next, learn how to use common tools to perform network attacks, including Metasploit, Netcat, Nmap, and Impacket. Finally, examine how to use the CrackMapExec tool, perform network analysis with Wireshark, generate custom payloads with MSFvenom, brute force passwords using Hydra, and perform poisoning attacks using Responder. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how to leverage high-value asset identification, descriptors and metrics, end of life systems, and default configurations during target prioritization
    Outline tool selection, documentation, dependencies, and scope limitations while prioritizing and preparing for attacks
    Differentiate between on-path, default credentials, vlan hopping, relay attacks, and packet crafting tools
    Use metasploit to identify vulnerabilities
    Perform port scanning and port listening using netcat
    Perform network scans using nmap
  • Use impacket to access network packets
    Collect active directory (ad) information using crackmapexec
    Use wireshark to perform network analysis
    Perform ethical hacking attacks using msfvenom
    Brute force passwords using hydra to gain access to a system
    Perform poisoning attacks using the responder utility
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 24s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 57s
    Through this video, you will be able to recognize how to leverage high-value asset identification, descriptors and metrics, end of life systems, and default configurations during target prioritization. FREE ACCESS
  • Locked
    3.  Capability Selection
    5m 48s
    Upon completion of this video, you will be able to outline tool selection, documentation, dependencies, and scope limitations while prioritizing and preparing for attacks. FREE ACCESS
  • Locked
    4.  Attack Types
    9m 5s
    After completing this video, you will be able to differentiate between on-path, default credentials, VLAN hopping, relay attacks, and packet crafting tools. FREE ACCESS
  • Locked
    5.  Identifying Vulnerabilities Using Metasploit
    9m 48s
    Discover how to use Metasploit to identify vulnerabilities. FREE ACCESS
  • Locked
    6.  Using the Netcat Utility
    12m 7s
    In this video, find out how to perform port scanning and port listening using Netcat. FREE ACCESS
  • Locked
    7.  Performing Network Scans Using Nmap
    18m 3s
    In this video, you will learn how to perform network scans using Nmap. FREE ACCESS
  • Locked
    8.  Accessing Network Packets Using Impacket
    12m 9s
    During this video, discover how to use Impacket to access network packets. FREE ACCESS
  • Locked
    9.  Using the CrackMapExec Post-Exploitation Tool
    14m 33s
    Find out how to collect Active Directory (AD) information using CrackMapExec. FREE ACCESS
  • Locked
    10.  Performing Network Analysis Using Wireshark
    20m 44s
    In this video, learn how to use Wireshark to perform network analysis. FREE ACCESS
  • Locked
    11.  Generating Custom Payloads Using MSFvenom
    10m 56s
    Discover how to perform ethical hacking attacks using MSFvenom. FREE ACCESS
  • Locked
    12.  Using Hydra to Brute Force Passwords
    8m 29s
    Learn how to brute force passwords using Hydra to gain access to a system. FREE ACCESS
  • Locked
    13.  Performing Poisoning Attacks Using Responder
    10m 11s
    In this video, find out how to perform poisoning attacks using the Responder utility. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)