Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking and CompTIA PenTest+
Chapter 1: Planning and Scoping
01 - Planning a Pen Test (8:54)
02 - Rules of Engagement (10:41)
03 - Resources and Budget (7:21)
04 - Impact and Constraints (5:17)
05 - Support Resources (13:26)
06 - Legal Groundwork (11:57)
07 - Scope Considerations (10:51)
08 - Lab Environment Setup (22:56)
09 - Project Strategy and Risk (9:24)
10 - Scope Vulnerabilities (13:32)
11 - Compliance-Based Assessments (5:25)
Planning and Scoping Quiz
Chapter 2: Surveying the Target
01 - Scanning and Enumeration (4:35)
02 - Scanning Demo (10:59)
03 - Packet Investigation (8:03)
04 - Packet Inspection Demo (6:02)
05 - Application and Open-Source Resources (11:52)
06 - Vulnerability Scanning (8:50)
07 - Vulnerability Scanning Demo (16:31)
08 - Target Considerations Part 1 (9:00)
08 - Target Considerations Part 2 (6:39)
09 - Nmap Timing and Performance Options (6:43)
10 - Prioritization of Vulnerabilities (9:17)
11 - Common Attack Techniques (12:17)
12 - Credential Attacks (14:41)
13 - Weaknesses in Specialized Systems (18:08)
Surveying the Target Quiz
Chapter 3: Selection Your Attack Vector
01 - Remote Social Engineering (6:50)
02 - Spear Phishing Demo (10:19)
03 - In-Person Social Engineering (12:00)
04 - Network-Based Exploits (7:19)
05 - FTP Exploit Demo (8:28)
06 - Man-in-the-middle Exploits (7:18)
07 - Wireless Exploits (13:29)
08 - Application Exploits, Part 1 (5:41)
09 - SQL Injection Demo (8:48)
10 - Application Exploits, Part 2 (8:14)
11 - Application Exploits, Part 3 (9:15)
12 - Cross-Site Scripting Demo (7:11)
13 - Code Vulnerabilities - Part 1 (7:59)
13 - Code Vulnerabilities - Part 2 (8:49)
14 - Local Host Vulnerabilities (5:08)
15 - Privilege Escalation (Linux) (9:49)
16 - Privelege Escalation (Windows) (6:17)
17 - Misc. Privilege Escalation (8:07)
18 - Misc. Local Host Vulnerabilities (8:17)
19 - Physical Security (11:27)
20 - Post-Explitation Techniques (11:23)
21 - Persistence and Stealth (10:55)
Selecting Your Attack Vector Quiz
Chapter 4: Selecting Pen Testing Tools
01 - Nmap Scoping and Output Options - Part 1 (9:59)
01 - Nmap Scoping and Output Options - Part 2 (11:15)
02 - Pen Testing Toolbox (6:59)
03 - Using Kali Linux (6:27)
04 - Scanners and Credential Tools (10:22)
05 - Code-Cracking Tools (4:35)
06 - Open-Source Research Tools (6:36)
07 - Wireless and Web Pen Testing Tools (11:03)
08 - Remote Access Tools (6:28)
09 - Analyzers and Mobile Pen Testing Tools (2:43)
10 - Other Pen Testing Tools (4:37)
11 - Using Scripting in Pen Testing (12:46)
12 - Bash Scripting Basics (15:10)
13 - Bash Scripting Techniques (10:21)
14 - PowerShell Scripts (4:16)
15 - Ruby Scripts (6:43)
16 - Python Scripts (5:59)
17 - Scripting Languages Comparison (11:06)
Selecting Pen Testing Tools Quiz
Chapter 5: Reporting and Communication
01 - Writing Reports - Part 1 (8:00)
01 - Writing Reports - Part 2 (11:15)
02 - Post-Report Activities (5:36)
03 - Mitigation Strategies (5:13)
04 - Communications (9:54)
Reporting and Communication Quiz
Teach online with
14 - Local Host Vulnerabilities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock