Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
35% Off Finance Skills That Get You Hired - Code CFI35
Overview
Syllabus
- The CompTIA Pentest+ Exam
- Pentesting
- Explain the Importance of Planning for an Engagement.
- Explain Key Legal Concepts
- Passive Information Gathering, Reconnaissance and Enumeration
- Passive Information Gathering Tools
- Reconnaissance Tools
- Vulnerability Management
- Vulnerability Scan Tools
- Interpreting Vulnerabilities Reports
- Exploit Types
- Metasploitable and Exploits DBs
- The Metasploit Framework
- Network Exploits
- NetBIOS Exploits
- Wireless Exploits
- Some Network Exploitation Tools
- Social Engineering
- Social Engineering Toolkit
- Exploiting Applications
- Injection Tools
- Special Permission Bits in Linux
- Exploiting Windows Hashes and Kernel
- Exploiting Linux Kernels
- Scripting in Bash, Powershell, Python and Ruby
- Reporting and Monitoring
Taught by
Paul Browning
Reviews
4.3 rating, based on 3 Class Central reviews
-
This course is a very clear and beginner-friendly guide to CompTIA PenTest+ (PT0-002). Paul Browning explains penetration testing concepts in a simple way, starting from the basics and gradually moving into more practical topics like reconnaissance, scanning, vulnerabilities, and reporting. I like that the course connects theory with real-world scenarios, which helps me understand how ethical hacking works in actual jobs. It’s especially helpful for students and aspiring security professionals who want structured preparation for the exam. Great pace, easy explanations, and very relevant to a cybersecurity career.
-
I recently had the opportunity to take the CompTIA PenTest+ Full Course (PT0-002), and I must say that it exceeded my expectations in every way. With a duration of 11 hours, this course was not only comprehensive but also provided valuable insights…
-
The Penetration Testing course provides an in-depth understanding of cybersecurity and ethical hacking. It covers essential topics like network scanning, vulnerability assessment, exploitation, and post-exploitation techniques. The course is well-structured for beginners and intermediate learners, offering hands-on experience with real-world tools and techniques. Trainers provide practical demonstrations and guidance on how to identify and mitigate security risks. Additionally, the course includes modules on various attack vectors, helping students develop a comprehensive understanding of cyber threats. Overall, it's a valuable resource for anyone interested in pursuing a career in cybersecurity or ethical hacking. Highly recommended!