CompTIA PenTest+: Reconnaissance & Enumeration

CompTIA PenTest+    |    Intermediate
  • 13 videos | 1h 59m 44s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Information gathering is a crucial phase in penetration testing (pen testing) where testers aim to collect as much data as possible about the target system or organization. This reconnaissance can be accomplished using various tools and techniques. In this course, you'll learn how to perform information gathering using passive and active reconnaissance. Discover how open-source intelligence (OSINT) gathered from social media, job boards, domain name systems, and password dumps can help with reconnaissance and how network reconnaissance is used to identify potential vulnerabilities in a computer network. Explore protocol scanning involving transmission control protocol (TCP) and user datagram protocol (UDP) and discover how to leverage certificate transparency logs during reconnaissance. Lastly, explore how to perform search engine analysis, network sniffing, banner grabbing, and website scraping. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between active and passive reconnaissance
    Recognize how open-source intelligence (osint) gathered from social media, job boards, domain name system, and password dumps can help with reconnaissance
    Outline how network reconnaissance is used to identify potential vulnerabilities in a computer network
    Differentiate between transmission control protocol (tcp) and user datagram protocol (udp)
    Perform a tcp and udp port scan on target systems
    Recognize how to leverage certificate transparency logs during reconnaissance
  • Outline how information disclosure vulnerabilities can be exploited by threat actors
    Provide an overview of search engine analysis
    Execute network sniffing techniques including internet of things (iot) and operational technology (ot) protocols
    Perform banner grabbing using nmap
    Scrape information from a website
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 13m 37s
    After completing this video, you will be able to differentiate between active and passive reconnaissance. FREE ACCESS
  • Locked
    3.  Open-source Intelligence (OSINT)
    6m 9s
    Upon completion of this video, you will be able to recognize how open-source intelligence (OSINT) gathered from social media, job boards, domain name system, and password dumps can help with reconnaissance. FREE ACCESS
  • Locked
    4.  Network Reconnaissance
    7m 5s
    After completing this video, you will be able to outline how network reconnaissance is used to identify potential vulnerabilities in a computer network. FREE ACCESS
  • Locked
    5.  Protocol Scanning
    16m 14s
    Upon completion of this video, you will be able to differentiate between Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). FREE ACCESS
  • Locked
    6.  Performing a Port Scan with Nmap
    19m 32s
    In this video, discover how to perform a TCP and UDP port scan on target systems. FREE ACCESS
  • Locked
    7.  Certificate Transparency Logs
    3m 49s
    After completing this video, you will be able to recognize how to leverage certificate transparency logs during reconnaissance. FREE ACCESS
  • Locked
    8.  Information Disclosure Vulnerabilities
    6m 26s
    Upon completion of this video, you will be able to outline how information disclosure vulnerabilities can be exploited by threat actors. FREE ACCESS
  • Locked
    9.  Search Engine Analysis
    4m 39s
    After completing this video, you will be able to provide an overview of search engine analysis. FREE ACCESS
  • Locked
    10.  Using Network Sniffing Techniques
    19m 37s
    In this video, find out how to execute network sniffing techniques including Internet of Things (IoT) and operational technology (OT) protocols. FREE ACCESS
  • Locked
    11.  Performing Banner Grabbing
    10m 25s
    Learn how to perform banner grabbing using nmap. FREE ACCESS
  • Locked
    12.  Performing Hypertext Markup Language (HTML) Scraping
    9m 57s
    In this video, you will learn how to scrape information from a website. FREE ACCESS
  • Locked
    13.  Course Summary
    49s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)