As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001.Job Roles:• Penetration Tester• Vulnerability Tester• Security Analyst (II)• Vulnerability Assessment Analyst• Network Security Operations• Application Security VulnerabilityPrerequisites:To ensure your success in this course, you should have:• Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.• Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.You can obtain this level of skills and knowledge by taking CompTIA® Security+® (Exam SY0-501) course or by obtaining the appropriate industry certification.Course content summary:Lesson 1: Planning and Scoping Penetration TestsTopic A: Introduction to Penetration Testing ConceptsTopic B: Plan a Pen Test EngagementTopic C: Scope and Negotiate a Pen Test EngagementTopic D: Prepare for a Pen Test EngagementLesson 2: Conducting Passive ReconnaissanceTopic A: Gather Background InformationTopic B: Prepare Background Findings for Next StepsLesson 3: Performing Non-Technical TestsTopic A: Perform Social Engineering TestsTopic B: Perform Physical Security Tests on FacilitiesLesson 4: Conducting Active ReconnaissanceTopic A: Scan NetworksTopic B: Enumerate TargetsTopic C: Scan for VulnerabilitiesTopic D: Analyze Basic ScriptsLesson 5: Analyzing VulnerabilitiesTopic A: Analyze Vulnerability Scan ResultsTopic B: Leverage Information to Prepare for ExploitationLesson 6: Penetrating NetworksTopic A: Exploit Network-Based VulnerabilitiesTopic B: Exploit Wireless and RF-Based VulnerabilitiesTopic C: Exploit Specialized SystemsLesson 7: Exploiting Host-Based VulnerabilitiesTopic A: Exploit Windows-Based VulnerabilitiesTopic B: Exploit *Nix-Based VulnerabilitiesLesson 8: Testing ApplicationsTopic A: Exploit Web Application VulnerabilitiesTopic B: Test Source Code and Compiled AppsLesson 9: Completing Post-Exploit TasksTopic A: Use Lateral Movement TechniquesTopic B: Use Persistence TechniquesTopic C: Use Anti-Forensics TechniquesLesson 10: Analyzing and Reporting Pen Test ResultsTopic A: Analyze Pen Test DataTopic B: Develop Recommendations for Mitigation StrategiesTopic C: Write and Handle ReportsTopic D: Conduct Post-Report-Delivery ActivitiesAppendix A: Mapping Course Content to CompTIA PenTest+
CompTIA PenTest+ Certification (Live Online)
via CourseHorse
Overview
Taught by
ONLC Training Centers