
| training | new training - Team Nuggets
New Course: CompTIA PenTest+ (PT0-002)
In this 217-video, intermediate-level training, Bob Salmans, Ben Finkel, and Shawn Powers cover the knowledge IT professionals need to plan and perform penetration tests and vulnerability scans, then analyze the results, decide on fixes and communicate them to team members.
Watch this new CompTIA Security training.
Penetration tests and vulnerability scans are two of the most important parts of keeping a network safe and secure. This PenTest+ training prepares security and IT personnel for everything they need to know to prepare for a penetration test, and then actually do it. But just being able to do a penetration test is only half the work — this PenTest+ training also explains how to analyze the results and come up with solutions to prevent hostile actors in the future. And all the while, you’ll be preparing for the CompTIA certification exam.
The 33-part series covers topics such as planning all the inputs and parameters for a successful penetration test, staying compliant with legal and company requirements, and performing vulnerability scans and penetration tests with the right tools and techniques.
Watch a video from the series:
The skills that comprise this series include:
- Understanding the Need for Scope Planning
- Explaining Key Legal Concepts
- Properly Scoping an Engagement
- Explain Compliance-Based Assessments
- Standards, Compliance and the Ethical Hacker Mindset
- Conduct Information Gathering Using Appropriate Techniques
- Perform a Vulnerability Scan
- Analyze Vulnerability Scan Results
- Leverage Information for Exploitation
- Explain Weaknesses Inherent to Specialized Systems
- Pentesting Reconnaissance
- Pentest Enumeration and NMAP
- Enumerating Services and Vulnerabilities
- Social Engineering Attacks and Tools
- Exploits and Payloads
- Metasploit Framework
- Network-Based Attacks and Tools
- Host Protocol Attacks and Tools
- Wireless and Mobile Device Attacks and Tools
- Web Application Vulnerabilities
- Web Application Pentesting
- All About Shells
- Windows Localhost Vulnerabilities, Attacks, and Tools
- Linux Localhost Vulnerabilities, Attacks, and Tools
- Physical Penetration Testing
- Credential Attacks
- Performing Attacks on Cloud Technologies
- Attacks and Vulnerabilities of Specialized Systems
- Post Exploit Activities
- Scripting Basics
- Analyzing Scripts
- Security Controls and Control Frameworks
- Pentest Reporting and Communications
Topics this training covers include:
- Planning a comprehensive vulnerability assessment
- Managing security with a focus on compliance
- Gathering information that can aid an exploitation
- Analyzing vulnerability scan results
- Exploiting vulnerabilities: network, wireless, application and RF
- Reporting findings and mitigating vulnerabilities
This training includes:
- 25 hours of training
- 217 videos

Download