Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+

In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.

Intermediate
2h 39m
(7)

Created by Matthew Lloyd Davies

Last Updated Jun 23, 2025

Course Thumbnail
  • Course

Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+

In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.

Intermediate
2h 39m
(7)

Created by Matthew Lloyd Davies

Last Updated Jun 23, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

If you're preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.

Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
Intermediate
2h 39m
(7)
Table of contents

About the author
Matthew Lloyd Davies - Pluralsight course - Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
Matthew Lloyd Davies
41 courses 4.7 author rating 47 ratings

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

Get started with Pluralsight