PT0-002: CompTIA PenTest+ Certification Exam Certification Video Training Course
The complete solution to prepare for for your exam with PT0-002: CompTIA PenTest+ Certification Exam certification video training course. The PT0-002: CompTIA PenTest+ Certification Exam certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA PT0-002 exam dumps, study guide & practice test questions and answers.
PT0-002: CompTIA PenTest+ Certification Exam Certification Video Training Course Exam Curriculum
Planning an Engagement
-
1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3)2:26
-
2. Risk (OBJ 1.2)9:11
-
3. Risk Handling (OBJ 1.2)7:52
-
4. Controls (OBJ 1.2)7:30
-
5. PenTest Methodologies (OBJ 1.2)7:55
-
6. PenTest Standards (OBJ 1.2)7:06
-
7. Planning a Test (OBJ 1.2)9:39
-
8. Legal Concepts (OBJ 1.1)8:20
-
9. Regulatory Compliance (OBJ 1.1)15:16
-
10. Professionalism (OBJ 1.3)10:31
Scoping an Engagement (PT0-002)
-
1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)3:35
-
2. Defining the Scope (OBJ 1.2)6:57
-
3. Adversary Emulation (OBJ 1.2)11:54
-
4. Target List (OBJ 1.2)10:56
-
5. Identifying Restrictions (OBJ 1.1)8:01
-
6. Rules of Engagement (OBJ 1.2)7:45
-
7. Assessment Types (OBJ 1.3)8:59
-
8. Validating the Scope (OBJ 1.2)5:17
-
9. Limitations and Permission (OBJ 1.1 and 1.3)6:57
-
10. Build a Virtual Lab16:39
Passive Reconnaissance (PT0-002)
-
1. Passive Reconnaissance (OBJ 2.1)2:39
-
2. Information Gathering (OBJ 2.1)5:57
-
3. Open-Source Intelligence (OSINT) (OBJ 2.1)5:36
-
4. Social Media Scraping (OBJ 2.1)2:29
-
5. OSINT Tools (OBJ 2.1)11:43
-
6. Using OSINT Tools (OBJ 2.1)26:35
-
7. DNS Information (OBJ 2.1)9:04
-
8. Reconnaissance with CentralOps (OBJ 2.1)13:05
-
9. Public Repositories (OBJ2.1)4:40
-
10. Search Engine Analysis (OBJ 2.1)6:21
-
11. URL Analysis (OBJ 2.1)15:20
-
12. Cryptographic Flaws (OBJ 2.1)16:31
-
13. CWE & CVE (OBJ 2.1)6:24
Active Reconnaissance
-
1. Active Reconnaissance (OBJ 2.2 and 2.3)2:19
-
2. Scanning and Enumeration (OBJ 2.2 and 2.3)10:07
-
3. Conducting Enumeration (OBJ 2.3)14:57
-
4. Other Enumeration (OBJ 2.2 and 2.3)9:24
-
5. Website Reconnaissance (OBJ 2.3)8:45
-
6. Detecting and Evading Defenses (OBJ 2.2)9:47
-
7. Packet Crafting (OBJ 2.2)10:29
-
8. Eavesdropping (OBJ 2.2)10:15
-
9. Wardriving (OBJ 2.2)8:17
-
10. DNS and ARP Analysis (OBJ 2.3)23:00
-
11. Network Traffic Analysis (OBJ 2.3)17:53
Vulnerability and Scanning (PT0-002)
-
1. Vulnerability Scanning (OBJ 2.3 and 2.4)1:57
-
2. Vulnerability Lifecycle (OBJ 2.3 and 2.4)8:36
-
3. Vulnerability Scans (OBJ 2.3 and 2.4)11:10
-
4. Scanning Considerations (OBJ 2.3 and 2.4)9:22
-
5. Nessus Scanning (OBJ 2.3 and 2.4)9:09
-
6. OpenVas Scanning (OBJ 2.3 and 2.4)13:35
-
7. Nikto Scanning (OBJ 2.3 and 2.4)5:19
Nmap (PT0-002)
-
1. Nmap (OBJ 2.3 and 2.4)2:31
-
2. Nmap Discovery Scans (OBJ 2.3 and 2.4)7:54
-
3. Nmap Port Scans (OBJ 2.3 and 2.4)9:13
-
4. Nmap Fingerprinting (OBJ 2.3 and 2.4)4:13
-
5. Using Nmap (OBJ 2.3 and 2.4)11:32
-
6. Nmap Scripting Engine (OBJ 2.3 and 2.4)20:21
Social Engineering and Physical Attacks (PT0-002)
-
1. Social Engineering and Physical Attacks (OBJ 3.6)3:36
-
2. Methods of Influence (OBJ 3.6)11:11
-
3. Social Engineering (OBJ 3.6)14:00
-
4. Phishing Campaigns (OBJ 3.6)5:14
-
5. Social Engineering Toolkit (OBJ 3.6)13:38
-
6. Pretexting (OBJ 3.6)4:08
-
7. Baiting Victims (OBJ 3.6)5:49
-
8. Impersonation (OBJ 3.6)4:17
-
9. Physical Security (OBJ 3.6)15:43
-
10. Lock Picking (OBJ 3.6)1:37
-
11. Physical Attacks (OBJ 3.6)10:25
-
12. Social Engineering Tools (OBJ 3.6)4:15
Wireless Attacks (PT0-002)
-
1. Wireless Attacks (OBJ 3.2)3:24
-
2. Wireless Security (OBJ 3.2)16:38
-
3. Bypassing MAC Filtering (OBJ 3.2)4:08
-
4. Signal Exploitation (OBJ 3.2)11:16
-
5. WEP Hacking (OBJ 3.2)9:22
-
6. WPA/WPA2 Hacking (OBJ 3.2)8:37
-
7. WPS PIN Attacks (OBJ 3.2)11:45
-
8. Evil Twins (OBJ 3.2)5:53
-
9. On-path and Relay Attacks (OBJ 3.2)4:47
-
10. Bluetooth Attacks (OBJ 3.2)5:50
-
11. RFID and NFC Attacks (OBJ 3.2)4:46
Network Attaks (PT0-002)
-
1. Network Attacks (OBJ 3.1)2:30
-
2. Stress Testing (OBJ 3.1)6:33
-
3. Exploit Resources (OBJ 3.1)6:23
-
4. ARP Poisoning (OBJ 3.1)7:17
-
5. DNS Cache Poisoning (OBJ 3.1)12:37
-
6. LLMNR/NBT-NS Poisoning (OBJ 3.1)4:50
-
7. MAC Spoofing (OBJ 3.1)5:23
-
8. VLAN Hopping (OBJ 3.1)6:56
-
9. NAC Bypass (OBJ 3.1)4:51
-
10. On-path Attack (OBJ 3.1)3:58
-
11. Password Attacks (OBJ 3.1)10:09
-
12. Pass the Hash (OBJ 3.1)7:55
-
13. Intro to Metasploit (OBJ 3.1)18:53
-
14. Netcat (OBJ 3.1)7:41
-
15. Using Netcat (OBJ 3.1)10:59
Application Vulnerabilities (PT0-002)
-
1. Application Vulnerabilities (OBJ 3.3)5:43
-
2. Race Conditions (OBJ 3.3)4:55
-
3. Buffer Overflows (OBJ 3.3)12:23
-
4. Buffer Overflow Attacks (OBJ 3.3)6:25
-
5. Authentication and References (OBJ 3.3)4:44
-
6. Improper Error Handling (OBJ 3.3)5:11
-
7. Improper Headers (OBJ 3.3)6:06
-
8. Code Signing (OBJ 3.3)1:56
-
9. Vulnerable Components (OBJ 3.3)11:42
-
10. Software Composition (OBJ 3.3)9:46
-
11. Privilege Escalation (OBJ 3.3)6:09
-
12. Conducting Privilege Escalation (OBJ 3.3)13:06
Application Attacks (PT0-002)
-
1. Application Attacks (OBJ 3.3)2:36
-
2. Directory Traversals (OBJ 3.3)9:32
-
3. Dirbuster (OBJ 3.3)7:15
-
4. Cross-Site Scripting (XSS) (OBJ 3.3)8:56
-
5. Cross-Site Request Forgery (CSRF) (OBJ 3.3)7:10
-
6. SQL Injections (OBJ 3.3)6:58
-
7. Conducting SQL Injections (OBJ 3.3)8:26
-
8. Burp Suite and SQLmap (OBJ 3.3)10:06
-
9. OWASP ZAP (OBJ 3.3)2:49
-
10. XML Injections (OBJ 3.3)6:20
-
11. Other Injection Attacks (OBJ 3.3)3:21
-
12. Attacking Web Applications (OBJ 3.3)15:36
Cloud Attacks (PT0-002)
-
1. Cloud Attacks (OBJ 3.4)2:08
-
2. Attacking the Cloud (OBJ 3.4)6:54
-
3. Credential Harvesting (OBJ 3.4)8:17
-
4. Misconfigured Assets (OBJ 3.4)12:12
-
5. Metadata Service Attack (OBJ 3.4)4:32
-
6. Software Development Kit (SDK) (OBJ 3.4)2:55
-
7. Auditing the Cloud (OBJ 3.4)5:04
-
8. Conducting Cloud Audits (OBJ 3.4)13:59
Attacks on Mobile Devices (PT0-002)
-
1. Attacks on Mobile Devices (OBJ 3.5)4:46
-
2. Enterprise Mobility Management (OBJ 3.5)9:32
-
3. Deployment Options (OBJ 3.5)4:34
-
4. Mobile Reconnaissance Concerns (OBJ 3.5)7:57
-
5. Mobile Device Insecurity (OBJ 3.5)12:15
-
6. Multifactor Authentication (OBJ 3.5)12:11
-
7. Mobile Device Attacks (OBJ 3.5)5:14
-
8. Malware Analysis (OBJ 3.5)13:13
-
9. Conducting Malware Analysis (OBJ 3.5)25:55
-
10. Mobile Device Tools (OBJ 3.5)8:21
Attacks on Specialized Systems (PT0-002)
-
1. Attacks on Specialized Systems (OBJ 3.5)2:44
-
2. Internet of Things (IoT) Devices (OBJ 3.5)8:17
-
3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5)7:35
-
4. Embedded Systems (OBJ 3.5)6:45
-
5. ICS and SCADA Devices (OBJ 3.5)9:16
-
6. ICS Protocols and Vulnerabilities (OBJ 3.5)10:51
-
7. Data Storage Vulnerabilities (OBJ 3.5)5:58
-
8. Virtual Environments (OBJ 3.5)8:16
-
9. Virtual Machine Attacks (OBJ 3.5)5:56
-
10. Containerization (OBJ 3.55:45
Post-exploitation (PT0-002)
-
1. Post-exploitation (OBJ 3.7)2:51
-
2. Enumerating the Network (OBJ 3.7)4:04
-
3. Network Segmentation Testing (OBJ 3.7)3:10
-
4. Lateral Movement and Pivoting (OBJ 3.7)2:58
-
5. Pass the Hash (OBJ 3.7)7:49
-
6. Golden Ticket (OBJ 3.7)6:05
-
7. Lateral Movement (OBJ 3.7)8:31
-
8. Pivoting (3.7)7:42
-
9. Escalating Privileges (OBJ 3.7)19:14
-
10. Upgrading Restrictive Shells (OBJ 3.7)5:26
Detection Avoidance (PT0-002)
-
1. Detection Avoidance (OBJ 3.7)1:31
-
2. Trojans and Backdoors (OBJ 3.7)4:20
-
3. Creating Persistence (OBJ 3.7)13:51
-
4. Living Off the Land (OBJ 3.7)12:01
-
5. Data Exfiltration (OBJ 3.7)6:46
-
6. Covert Channels (OBJ 3.7)4:44
-
7. Steganography (3.7)2:58
-
8. Covering Your Tracks (OBJ 3.7)10:03
-
9. Persistence and Covering Your Tracks (OBJ 3.7)8:44
-
10. Post-Exploitation Tools (OBJ 3.7)3:00
Communication and Reports (PT0-002)
-
1. Communication and Reports (OBJ 4.3)1:44
-
2. Communication Paths (OBJ 4.3)5:25
-
3. Communication Triggers (OBJ 4.3)4:36
-
4. Reasons for Communication (OBJ 4.3)10:18
-
5. Presentation of Findings (4.1 & OBJ 4.3)6:05
-
6. Report Data Gathering (OBJ 4.1)3:38
-
7. Written Reports (OBJ 4.1)14:44
-
8. Common Themes (OBJ 4.1)3:01
-
9. Securing and Storing Reports (OBJ 4.1)5:06
Findings and Remediations (PT0-002)
-
1. Findings and Remediations (OBJ 4.2)2:32
-
2. Security Control Categories (OBJ 4.2)13:35
-
3. Selecting Security Controls (OBJ 4.2)3:56
-
4. Physical Controls (OBJ 4.2)6:55
-
5. Operational Controls (OBJ 4.2)10:22
-
6. Administrative Controls (OBJ 4.2)14:23
-
7. System Hardening (OBJ 4.2)10:55
-
8. Secure Coding (OBJ 4.2)8:19
-
9. Implementing MFA (OBJ 4.2)6:21
-
10. Digital Certificates (OBJ 4.2)9:47
-
11. Other Technical Controls (OBJ 4.2)2:41
-
12. Mitigation Strategies (OBJ 4.2)8:07
Post-report Activities (PT0-002)
-
1. Post-report Activities (OBJ 4.2)2:42
-
2. Removing Shells and Tools (OBJ 4.2)2:53
-
3. Deleting Test Credentials (OBJ 4.2)1:53
-
4. Destroy Test Data (OBJ 4.2)2:51
-
5. Client Acceptance (OBJ 4.2)2:57
-
6. Attestation of Findings (OBJ 4.2)3:00
-
7. Lessons Learned (OBJ 4.2)4:04
-
8. Retesting (OBJ 4.2)2:42
Scripting Basics (PT0-002)
-
1. Scripting Basics (OBJ 5.1 & OBJ 5.2)2:24
-
2. Scripting Tools (OBJ 5.2)9:50
-
3. Variables (OBJ 5.1)7:52
-
4. Loops (OBJ 5.1)5:20
-
5. Logic Control (OBJ 5.1)4:35
-
6. Data Structures (OBJ 5.1)12:40
-
7. Object Oriented Programming (OBJ 5.1)6:59
Analyzing Scripts (PT0-002)
-
1. Analyzing Scripts (OBJ 5.2)5:18
-
2. Coding in Bash (OBJ 5.2)21:17
-
3. Bash Example (OBJ 5.2)4:35
-
4. Coding in PowerShell (OBJ 5.2)15:41
-
5. PowerShell Example (OBJ 5.2)3:25
-
6. Coding in Python (OBJ 5.2)19:52
-
7. Python Example (OBJ 5.2)3:40
-
8. Coding in Perl (OBJ 5.2)17:24
-
9. Perl Example (OBJ 5.2)16:11
-
10. Coding in JavaScript (OBJ 5.2)19:22
-
11. JavaScript Example (OBJ 5.2)9:48
-
12. Coding in Ruby (OBJ 5.2)13:43
-
13. Ruby Example (OBJ 5.2)4:15
Expoits and Automation (PT0-002)
-
1. Exploits and Automation (OBJ 5.2)1:37
-
2. Exploits to Download Files (OBJ 5.2)4:27
-
3. Exploits for Remote Access (OBJ 5.2)9:26
-
4. Exploits for Enumerating Users (OBJ 5.2)5:57
-
5. Exploits for Enumerating Assets (OBJ 5.2)5:24
-
6. Automation in Engagements (OBJ 5.2)3:28
-
7. Automation with Nmap Scripts (OBJ 5.2)2:35
Tool Round-up (PT0-002)
-
1. Tool Round-up (OBJ 5.3)2:54
-
2. OSINT Tools (OBJ 5.3)6:14
-
3. Scanning Tools (OBJ 5.3)6:40
-
4. Networking Tools (OBJ 5.3)2:31
-
5. Wireless Tools (OBJ 5.3)7:37
-
6. Social Engineering Tools (OBJ 5.3)2:36
-
7. Remote Access Tools (OBJ 5.3)4:24
-
8. Credential Testing Tools (OBJ 5.3)7:39
-
9. Web Application Tools (OBJ 5.3)2:26
-
10. Cloud Tools (OBJ 5.3)2:59
-
11. Steganography Tools (OBJ 5.3)6:35
-
12. Debuggers (OBJ 5.3)5:32
-
13. Miscellaneous Tools (OBJ 5.3)9:27
Conclusion (PT0-002)
-
1. Conclusion9:13
About PT0-002: CompTIA PenTest+ Certification Exam Certification Video Training Course
PT0-002: CompTIA PenTest+ Certification Exam certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's PT0-002: CompTIA PenTest+ Certification Exam video training course for passing certification exams is the only solution which you need.
Pass CompTIA PT0-002 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!
PT0-002 Premium Bundle
- Premium File 448 Questions & Answers. Last update: Dec 16, 2024
- Training Course 237 Video Lectures
- Study Guide 795 Pages
Free PT0-002 Exam Questions & CompTIA PT0-002 Dumps | ||
---|---|---|
Comptia.test-king.pt0-002.v2024-10-26.by.ava.40q.ete |
Views: 98
Downloads: 313
|
Size: 1.65 MB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register