CompTIA PenTest+ (Exam PT0-001) Online Training Course

Provided by

Enquire about this course

About the course

Course Description
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the PT0-001 exam, while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are mostly Kali  Linuxbased, covering a broad range of real-world examples used by penetration testers and red teams.

The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.


Course Content
The topics in this course follow a natural real-world pentest engagement flow, as well as map to the exam objectives.

Module 1 - The Pen Test Engagement
In this module, you will learn how to work with a client and prepare for a penetration testing engagement. The topics are:

1. Penetration Testing Overview
In this topic, you will learn what a penetration test is, the steps taken to prepare for a pentest, tools used, communicating with the client and your team, and pen testing standards and frameworks.

2. Engagement Planning
 In this topic, you will learn about the logistics of planning for a pentest engagement including setting scope, determining end goals and deliverables, assessment types, threat modeling, and scheduling.

3. Engagement Documents
In this topic, you will learn about documentation required for a professional pentest engagement including contracts, authorizations, rules of engagement, impact analysis, disclaimers, and support resources.

4. Prepare to Go Live
 In this topic, you will prepare both the client and your team to start the actual test.

Module 2 - Passive Reconnaissance
In this module, you will learn how to gather background information on your target. The topic is:

1. OSINT
 In this topic, you will learn about passive reconnaissance through open source intelligence gathering, including using websites, social media, Google hacking, DNS querying, and other tools.

Activities include using Whois, Google Hacking Database, theHarvester, Recon-ng, FOCA, dig, nslookup, and Shodan.

Module 3 - Active Reconnaissance
In this module, you will learn how to actively search for targets. The topics are:

1. Host Discovery and Port Scanning
 In this topic, you will learn about the different tools and methods for discovering target systems and the services they provide.
Activities include using the command line, nmap, and Metasploit.

2. Enumeration
In this topic, you will learn how to obtain additional information from network services, Windows and Linux systems, as you prepare to exploit those systems.

Activities include using Windows and Linux command line commands, nmap, netcat, telnet, rpcclient, dirbuster, and Metasploit.

3. Vulnerability Scanning
In this topic, you will use different types of scans including packet crafting to discover exploitable vulnerabilities on hosts, websites, network services, and network devices.

Activities include using OpenVAS, nmap NSE scripts, Metasploit Pro, sqlmap, Nikto, MBSA, hping3, airmon-ng, aircrack-ng, Fern Wi-Fi Cracker, mdk3, and Kismet.

Module 4 - Physical Security
In this module, you will learn how to test physical security controls. The topic is:

1. Physical Security Tests
In this topic, you will learn about ways to circumvent physical security controls to gain access to restricted areas.

Activities include RFID badge cloning

Module 5 - Social Engineering
In this topic, you will learn about social engineering. The topic is:

1. Social Engineering Attacks
In this topic, you will learn how to execute both technical and non-technical social engineering attacks.

Activities include using msfvenom and Metasploit for USB stick baiting, and the Kali Social Engineering Toolkit for website login cloning, phishing, and credential interception.

Module 6 - Vulnerability Scan Analysis
In this module, you will learn how to examine vulnerability scan results to choose the best exploit against discovered targets. The topic is:

1. Vulnerability Scan Results
In this topic, you will learn how to assess vulnerability scan results, weed out false positives, adjudicate and prioritize findings, and map vulnerabilities to exploits. You will also learn about both the value and limits of using automated vulnerability scans in your pentest engagement.

Activities include using Metasploit Pro to validate vulnerability scan findings and determine the appropriate exploit modules that can be used to penetrate the vulnerable systems.

Module 7 - Password Cracking
In this module, you will learn the basics of password cracking. The topic is:

1. Password Cracking Types
In this topic, you will learn about dictionary, rainbow table, and brute force attacks. You will learn how to brute force network service authentication, intercept a network authentication, and pass-the-hash.

Activities include using Medusa, John-the-Ripper, Wireshark, and Metasploit.

NOTE: You will learn additional password cracking techniques in subsequent modules.

Module 8 - Penetrating Wired Networks
In this module, you will learn how to penetrate a wired Ethernet network. The topic is:

1. Common Network Exploits
In this topic, you will learn how to sniff wired network activity, intercept file transfers, read transmitted email, conduct Man-in-the-Middle attacks using ARP poisoning, hijack TCP sessions, execute network-based denial-of-service attacks, and exploit common network services.

Activities include using Wireshark, ettercap, Low Orbit Ion Cannon, nmap, the Searchsploit database, gcc, and Metasploit.

Module 9 - Penetrating Wireless Networks
In this module, you will learn how attack wireless networks. The topic is:

1. Wireless Network Exploits
In this topic you will learn how to sniff and jam Wi-Fi networks, crack WEP, WPA/WPA2 and WPS, conduct Evil Twin attacks, and attack BlueTooth.

Activities include using Netcut, Wireshark, and airmon-ng, besside-ng, bettercap, and Wi-Fi Pumpkin.

Module 10 - Windows Exploits
In this module, you will learn how to exploit Windows hosts. The topics are:

1. Common Windows-Based Vulnerabilities
In this topic you will learn about common Windows vulnerabilities, exploits, and payloads.

Activities include using Metasploit, the Searchsploit database, and command-line commands.

2. Password Cracking in Windows
In this topic, you will learn about cracking Windows passwords.

Activities include using Cain & Abel, John-the-Ripper and L0pht 7

3. Windows Components
In this topic, you will learn how to exploit standard Windows components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.

Activities include using Metasploit and the Searchsploit database.

4. Windows Accounts
In this topic you will learn how to exploit default and user-defined Windows accounts.

Activities include using Metasploit and command-line commands.

5. Sandboxes
In this topic, you will learn about using sandboxing to contain hacking attempts.

Module 11 - Linux Exploits
In this module, you will learn how to hack Linux systems. The topics are:

1. Common Linux/Unix-Based Vulnerabilities
In this topic you will learn about common Linux vulnerabilities, exploits, and payloads.

Activities include using Metasploit, the Searchsploit database, and command-line commands.

2. Password Cracking in Linux
In this topic you will learn how to crack Linux passwords.

Activities include using command-line commands, unshadow, and John-the-Ripper.

3. Vulnerable Linux Components
In this topic, you will learn how to exploit standard Linux components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.

Activities include using command-line commands, Metasploit and the Searchsploit database.

4. Linux Accounts
In this topic, you will learn how to attack default Linux accounts.

Activities include using Linux bash commands.

Module 12 - Mobile Devices
In this module, you will learn how to attack mobile devices. The topics are:

1. Android Exploits
In this topic, you will learn how to exploit common Android vulnerabilities

Activities include using msfvenom and Metasploit to compromise and remotely control an Android phone.

2. Apple Exploits
In this topic, you will learn how to exploit common Apple vulnerabilities

Activities include using nmap and WinSCP to access a compromised iPhone.

Module 13 - Specialized Systems
In this module, you will learn about specialized systems. The topics are:

1. ICS
In this topic, you will learn about common vulnerabilities of industrial control ICS and SCADA systems

2. Embedded Systems
In this topic, you will learn about common vulnerabilities of embedded systems such as point-of-sale and real-time operating systems

Activities include using a Raspberry PI to attack an internal network.

3. 13.3 IoT
In this topic, you will learn about common and emerging threats related to the Internet of Things

4. 13.4 Hardware Attacks
In this topic, you will learn about additional hardware-based attacks that can be conducted against specialized systems.

Module 14 - Scripts
In this module, you will learn the basics of scripting, as pertains to penetration testing. The topics are:

1. Scripting Basics
In this topic, you will learn about the basics of Bash, PowerShell, Python, and Ruby scripting

2. Common Scripting Elements
In this topic, you will learn about common scripting elements found in all of the scripting languages including variables, substitution, arrays, operations, logic, and error handling.

Activities include writing simple scripts.

Module 15 - Application Testing
In this module you will learn about testing application code for vulnerabilities. The topics are:

1. Static Code Analysis
In this topic, you will learn how to analyze static, non-running code

2. Dynamic Code Analysis
In this topic, you will learn how to test running code.

Activity includes fuzz testing an application for potential buffer overflow vulnerabilities.

3. Reverse Engineering
In this topic, you will learn about application reverse-engineering techniques including de-compilation, disassembly, and debugging.

Module 16 - Web App Exploits
In this module, you will learn how to exploit web apps. The topics are:

1. Common Web Application Vulnerabilities
In this topic, you will learn how to exploit authentication, authorization, misconfigurations, browser sessions, and insecure code.

2. Injection Attacks
In this topic, you will learn about various injection techniques.

Activities include using a browser, sqlmap, and Metasploit to inject code and SQL commands into a web app form.

3. Cross-Site Attacks
In this topic, you will learn how to conduct Cross-Site Scripting and Cross-Site Request Forgery attacks.

Activities include using a browser and other tools to perform XSS attacks.

4. Other Web-Based Attacks
In this topic, you will learn how to conduct other types of web-based attacks including clickjacking, file inclusion, and webshells.

Module 17 - Lateral Movement
In this module, you will learn how to move around in a compromised network. The topic is:

1. Lateral Movement Techniques
In this topic, you will learn how to use lateral movement techniques including migrating malicious code to another process, pivoting, and using proxy chains.

Activities include using Metasploit to migrate code and pivot through the target network, and Armitage Team Server to pass control to another attacker.

 

Enquire

Start date Location / delivery
No fixed date Online Book now

Related article

Addressing The Weakest link John McGlone at The Training Centre outlines how you can address the weakest link in cybersecurity. Companies spend a s...