Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep

Packt via Coursera

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Prepare for the CompTIA PenTest+ (PT0-003) exam with hands-on training in ethical hacking techniques and penetration testing best practices. You will learn to plan and execute penetration tests, gather intelligence, conduct vulnerability scanning, and exploit weaknesses in various network and system environments. Along the way, you'll develop skills to assess real-world scenarios in wireless, web, cloud, and mobile platforms. Throughout the course, you’ll delve into core penetration testing concepts like legal groundwork, network-based attacks, and advanced techniques like privilege escalation, social engineering, and post-exploitation tactics. You’ll also gain proficiency in using a wide array of tools such as Kali Linux, Wireshark, Metasploit, and Nmap for performing penetration tests and interpreting results. This course is perfect for those aiming to take the CompTIA PenTest+ certification exam, IT professionals seeking to expand their skills, or anyone interested in entering the field of ethical hacking. You’ll be guided through each step, from planning and engagement to reporting findings, ensuring you’re fully prepared to excel. By the end of the course, you will be able to perform vulnerability assessments, exploit weaknesses, conduct network-based and wireless attacks, utilize advanced tools, and understand the legal and ethical aspects of penetration testing.

Syllabus

  • Introduction to CompTIA PenTest+ (PT0-003)
    • In this module, we will introduce you to the CompTIA PenTest+ (PT0-003) exam, detailing the exam objectives and the core ethical hacking topics covered throughout the course. You will also gain insight into the latest updates to the exam, ensuring you are well-equipped for success. This foundation will guide you through your learning journey, ensuring thorough preparation for the certification.
  • Planning and Engagement
    • In this module, we will cover essential aspects of planning and engaging in penetration tests. You will learn how to establish proper guidelines, scope, and legal frameworks for ethical hacking projects. Additionally, we’ll discuss best practices for managing client expectations and ensuring regulatory compliance throughout your engagements.
  • Information Gathering and Vulnerability Scanning
    • In this module, we will dive into the process of information gathering and vulnerability scanning. You'll learn to leverage tools like Nmap and Wireshark for gathering data, scanning networks, and prioritizing vulnerabilities. By the end of the module, you will have hands-on experience in identifying and analyzing weak points in a network to prepare for further exploitation.
  • Network-Based Attacks
    • In this module, we will explore network-based exploits, focusing on common vulnerabilities found in protocols like DNS, ARP, SMB, and FTP. You'll gain practical experience in launching attacks such as man-in-the-middle, DNS spoofing, and FTP exploits, learning how to exploit these weaknesses for penetration testing engagements.
  • Wireless and RF Attacks
    • In this module, we will explore wireless and RF attacks that target vulnerabilities in modern wireless networks. From packet sniffing and jamming to advanced techniques like evil twin and WPS exploitation, this module will provide you with the tools and knowledge to effectively exploit wireless communication weaknesses.
  • Web and Database Attacks
    • In this module, we will focus on web and database attacks, including SQL injection, cross-site scripting (XSS), and privilege escalation techniques. You will practice exploiting common web application vulnerabilities using tools like Burp Suite and SQLmap, preparing you for real-world penetration testing scenarios.
  • Attacking the Cloud
    • In this module, we will dive into attacking the cloud, examining the vulnerabilities in cloud environments and how attackers exploit them. From resource exhaustion to account takeover, you’ll learn techniques used to target cloud services and how to identify misconfigurations that leave systems vulnerable.
  • Specialized and Fragile Systems
    • In this module, we will cover specialized and fragile systems, including mobile devices, virtual environments, and ICS networks. You’ll learn how to identify and exploit vulnerabilities in these complex systems and gain hands-on experience in securing mobile applications and virtualized environments.
  • Social Engineering and Physical Attacks
    • In this module, we’ll explore social engineering and physical attacks, teaching you how to manipulate human behavior to gain unauthorized access to systems and data. You’ll also gain insights into physical security weaknesses and learn techniques to bypass physical defenses and access sensitive information.
  • Post-Exploitation
    • In this module, we will focus on post-exploitation techniques, covering methods to maintain access and move laterally across networks after gaining entry. You'll also explore tools for maintaining stealth and persistence, ensuring that your access remains undetected throughout the engagement.
  • Post-Engagement Activities
    • In this module, we will cover post-engagement activities such as report writing, mitigation strategies, and system clean-up. You will learn how to deliver comprehensive reports and suggest practical solutions for improving security, ensuring the client can take actionable steps based on your findings.
  • Tools and Code Analysis
    • In this module, we will introduce the use of scripting and code analysis in penetration testing. You will explore how to use scripting languages like Bash, Python, and Ruby to automate tasks, and dive into code analysis tools and libraries to improve your testing methodology.
  • Tools Inventory
    • In this module, we will dive into a comprehensive toolkit for penetration testers. From Nmap and Metasploit to Burp Suite and Wireshark, you’ll learn how to effectively use these tools to perform a variety of testing tasks, helping you enhance your skills and efficiency as an ethical hacker.

Taught by

Packt - Course Instructors

Reviews

Start your review of Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.