Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.
What you'll learn
If you're preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.
Table of contents
- Post-exploitation in Context 5m
- Demo: PowerShell Empire 3m
- Enumeration 2m
- Enumeration – Living off the LAN 4m
- Lateral Movement, Pivoting, and Privilege Escalation 6m
- Demo: Lateral Movement with Pass-the-hash 3m
- Persistence 5m
- Demo: Maintaining Persistence on Windows 3m
- Avoiding Detection 4m
- Demo: Avoiding Detection 7m
- Exam Essentials 4m