Table of contents
Course Introduction
0mins
Lock icon
About the Author | 0m
Lock icon
About the Course | 0m
Lock icon
Setting Up Your Pentest Lab | 0m
Lock icon
About the Exam | 0m
1.1 Planning for an Engagement
0mins
Lock icon
Pentests and Pentesting Frameworks | 0m
Lock icon
The Pentest Process | 0m
Lock icon
Communication, Rules of Engagement, and Resources | 0m
Lock icon
Confidentiality, Budgeting, Impact Analysis, Remediation Timelines, Disclaimers, and Constraints | 0m
1.2 Legal Considerations
0mins
Lock icon
Key Legal Concepts | 0m
1.3 Scoping an Engagement
0mins
Lock icon
Defining the Scope, Goals and Deliverables, and Assessments and Strategies | 0m
Lock icon
Threat Actors, Risk Response, and Tolerance | 0m
Lock icon
Types of Targets and Pentest Considerations | 0m
1.4 Key Aspects of Compliance-Based Assessments
45mins
Lock icon
Understanding Compliance | 0m
Lock icon
Planning and ScopingPlanning and Scoping | 45m
2.1 Information Gathering Techniques
0mins
Lock icon
Active and Passive Reconnaissance | 0m
Lock icon
Weaponizing Data and Introduction to Metasploit | 0m
Lock icon
Enumeration | 0m
Lock icon
Introduction to Meterpreter | 0m
Lock icon
Scenario Walkthrough 01: How to Use Nmap to Scan a Host | 0m
Lock icon
Scenario Walkthrough 02: How to Enumerate a Service with Banner Grabbing | 0m
Lock icon
Scenario Walkthrough 03: Performing Website Enumeration with Kali Linux | 0m
Lock icon
Scenario Walkthrough 04: Using OWASP Dirbuster to Find Hidden Directories | 0m
Lock icon
Scenario Walkthrough 05: Finding OSINT Data Using theHarvester and the OSRFramework | 0m
2.2 Performing a Vulnerability Scan
0mins
Lock icon
Vulnerability Scanning | 0m
Lock icon
Scenario Walkthrough 06: Scanning Websites for Vulnerabilities Using Nikto | 0m
Lock icon
Scenario Walkthrough 07: Performing a Vulnerability Scan using OpenVAS | 0m
Lock icon
Scenario Walkthrough 08: Using Nmap to Scan for Vulnerabilities | 0m
2.3 Analyzing Vulnerability Scan Results
0mins
Lock icon
Vulnerability Analysis | 0m
Lock icon
Scenario Walkthrough 09: Analyzing an OpenVAS Vulnerability Report | 0m
2.4 Leveraging Information to Prepare for Exploitation
0mins
Lock icon
Leveraging Information | 0m
Lock icon
Scenario Walkthrough 10: An Introduction to CherryTree | 0m
2.5 System Weaknesses
90mins
Lock icon
Weaknesses of Specialized Systems | 0m
Lock icon
Information Gathering and Vulnerability IdentificationInformation Gathering and Vulnerability Identification | 1h 30m
3.1 Social Engineering
0mins
Lock icon
Components of a Social Engineering Attack | 0m
Lock icon
Social Engineering Attacks and Techniques | 0m
Lock icon
Scenario Walkthrough 11: Creating a Credential Harvesting Website with SET | 0m
Lock icon
Scenario Walkthrough 12: Using SET to Execute a Spear Phishing Attack | 0m
Lock icon
Scenario Walkthrough 13: Executing a USB Dropper Attack Using SET | 0m
3.2 Network-Based Vulnerabilities
0mins
Lock icon
Sniffing, Hijacking, and Man-in-the-Middle Attacks | 0m
Lock icon
Network Protocol Attacks | 0m
Lock icon
Name Resolution, Brute Force, and DoS Attacks | 0m
Lock icon
Scenario Walkthrough 14: DNS Poisoning Using the Hosts File | 0m
Lock icon
Scenario Walkthrough 15: Using Wireshark to Sniff Plaintext Passwords | 0m
3.3 Wireless and RF-Based Vulnerabilities
0mins
Lock icon
Wireless Attacks and Exploits | 0m
Lock icon
Performing an Evil Twin Attack with SSLsplit | 0m
3.4 Application-Based Vulnerabilities
0mins
Lock icon
Directory Traversal and Poison Null Bytes | 0m
Lock icon
Authentication, Authorization, and Injection Attacks | 0m
Lock icon
File Inclusion Vulnerabilities and Web Shells | 0m
Lock icon
Scenario Walkthrough 16: Using Hydra to Brute-Force FTP | 0m
Lock icon
Scenario Walkthrough 17: Finding Web Application Vulnerabilities with OWASP ZAP | 0m
3.5 Local Host Vulnerabilities
0mins
Lock icon
OS Vulnerabilities and Password Cracking | 0m
Lock icon
Password Cracking Tools, Default Accounts, and Privilege Escalation | 0m
Lock icon
System Files, Sandbox Escapes, and Hardware Attacks | 0m
Lock icon
Scenario Walkthrough 18: Obtaining Password Hashes with Armitage | 0m
Lock icon
Scenario Walkthrough 19: Cracking Password Hashes with John the Ripper | 0m
Lock icon
Scenario Walkthrough 20: Performing Local Privilege Escalation with Meterpreter | 0m
Lock icon
Scenario Walkthrough 21: Exploiting the EternalBlue Vulnerability | 0m
3.6 Physical Security Vulnerabilities
0mins
Lock icon
Physical Security Goals and Guidelines | 0m
3.7 Post-Exploitation Techniques
75mins
Lock icon
Lateral Movement, Pivoting, and Persistence | 0m
Lock icon
Shells, Netcat, and Scheduled Tasks | 0m
Lock icon
Services/Daemons, Anti-Forensics, and Covering Your Tracks | 0m
Lock icon
Scenario Walkthrough 22: Clearing System Logs with Meterpreter | 0m
Lock icon
Scenario Walkthrough 23: Setting Up Persistence with Netcat | 0m
Lock icon
Scenario Walkthrough 24: Exfiltrating Data with Netcat | 0m
Lock icon
Scenario Walkthrough 25: Setting Up Persistence with Meterpreter | 0m
Lock icon
Scenario Walkthrough 26: Exfiltrating Data with Meterpreter | 0m
Lock icon
Attacks and ExploitsAttacks and Exploits | 1h 15m
4.1 Using Nmap for Information Gathering
0mins
Lock icon
Nmap Deep Dive | 0m
4.2 Choosing Pentesting Tools
0mins
Lock icon
Pentesting Tools and Use Cases | 0m
4.3 Analyzing Tool Output and Data
0mins
Lock icon
Understanding Tool Outputs | 0m
Lock icon
Scenario Walkthrough 27: Executing a Pass-the-Hash Attack | 0m
Lock icon
Scenario Walkthrough 28: Performing a SQL Injection Attack | 0m
4.4 Analyzing Basic Scripts
30mins
Lock icon
Analyzing Scripts in Bash, PowerShell, Python, and Ruby | 0m
Lock icon
Penetration Testing ToolsPenetration Testing Tools | 30m
5.1 Report Writing and Handling
0mins
Lock icon
Report Writing and Handling Best Practices | 0m
5.2 Post-Report Delivery Activities
0mins
Lock icon
Delivery and Post-Delivery | 0m
5.3 Mitigating Discovered Vulnerabilities
0mins
Lock icon
Vulnerability Mitigation Strategies | 0m
5.4 Communicating During the Penetration Testing Process
15mins
Lock icon
The Importance of Communications | 0m
Lock icon
Reporting and CommunicationsReporting and Communications | 15m
Next Steps
240mins
Lock icon
Taking the PenTest+ Certification Exam | 0m
Lock icon
PenTest+PenTest+ | 4h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon