PT0-001: CompTIA PenTest+ Certification Exam
Your CompTIA PT0-001 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the PT0-001 certification test. Ace your CompTIA PT0-001 at the first attempt and obtain the CompTIA PenTest+ Certification Exam credential with ease.
Curriculum for PT0-001 Video Course
Introduction
Video Name | Time | |
---|---|---|
1. Exam Foundations | 5:00 |
Video Name | Time | |
---|---|---|
1. Planning and Scoping (Overview) | 1:00 | |
2. Penetration Testing Methodology | 3:00 | |
3. Planning a Penetration Test | 8:00 | |
4. Rules of Engagement | 6:00 | |
5. Legal Concepts | 11:00 | |
6. Testing Strategies | 3:00 | |
7. White Box Support Resources | 7:00 | |
8. Types of Assessments | 6:00 | |
9. Threat Actors | 8:00 | |
10. Target Selection | 5:00 |
Video Name | Time | |
---|---|---|
1. Information Gathering and Vulnerability Identification (Overview) | 3:00 | |
2. Information Gathering | 10:00 | |
3. Reconnaissance with CentralOps (Demo) | 13:00 | |
4. Scanning and Enumeration | 5:00 | |
5. Fingerprinting | 4:00 | |
6. Scanning and Enumeration (Demo) | 16:00 | |
7. Cryptographic Inspection | 2:00 | |
8. Eavesdropping | 3:00 | |
9. Decompiling and Debugging | 3:00 | |
10. Open Source Research | 6:00 | |
11. Vulnerability Scanning | 9:00 | |
12. Scanning Considerations | 6:00 | |
13. Application and Container Scans | 3:00 | |
14. Analyzing Vulnerability Scans | 7:00 | |
15. Leverage Information for Exploit | 3:00 | |
16. Common Attack Vectors | 6:00 | |
17. Weaknesses in Specialized Systems | 11:00 |
Video Name | Time | |
---|---|---|
1. Attacks and Exploits (Overview) | 2:00 | |
2. Social Engineering | 12:00 | |
3. Motivation Factors | 7:00 | |
4. Physical Security Attacks | 6:00 | |
5. Lock Picking (Demo) | 1:00 | |
6. Network-based Vulnerabilities | 14:00 | |
7. Wireless-based Vulnerabilities | 9:00 | |
8. Wireless Network Attack (Demo) | 6:00 | |
9. Application-based Vulnerabilities | 19:00 | |
10. Local Host Vulnerabilities | 3:00 | |
11. Privilege Escalation (Linux) | 5:00 | |
12. Privilege Escalation (Windows) | 11:00 | |
13. Privilege Escalation | 5:00 | |
14. Privilege Escalation (Demo) | 5:00 | |
15. Lateral Movement | 9:00 | |
16. Persistence | 7:00 | |
17. Covering Your Tracks | 6:00 | |
18. Persistence and Covering Tracks (Demo) | 8:00 |
Video Name | Time | |
---|---|---|
1. Penetration Testing Tools (Overview) | 3:00 | |
2. Nmap Usage | 10:00 | |
3. Nmap Usage (Demo) | 12:00 | |
4. Use Cases for Tools | 7:00 | |
5. Scanners | 2:00 | |
6. Credential Testing Tools | 7:00 | |
7. Password Cracking (Demo) | 2:00 | |
8. Debuggers | 3:00 | |
9. Software Assurance | 2:00 | |
10. OSINT | 5:00 | |
11. Wireless | 2:00 | |
12. Web Proxies | 9:00 | |
13. Social Engineering Tools | 1:00 | |
14. Remote Access Tools | 7:00 | |
15. Networking Tools | 2:00 | |
16. Mobile Tools | 2:00 | |
17. Miscellaneous Tools | 4:00 | |
18. Intro to Programming | 3:00 | |
19. Programming Concepts | 22:00 | |
20. BASH Script Example | 5:00 | |
21. Python Script Example | 4:00 | |
22. PowerShell Script Example | 3:00 | |
23. Ruby Script Example | 4:00 |
Video Name | Time | |
---|---|---|
1. Reporting and Communication (Overview) | 2:00 | |
2. Pentest Communications | 9:00 | |
3. Report Writing | 8:00 | |
4. Mitigation Strategies | 7:00 | |
5. Post-Report Activities | 4:00 | |
6. Pentest Report Example | 1:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals