Laying the Foundation for Penetration Testing for CompTIA PenTest+
So, you want to start a career in penetration testing but don't know where to start? Maybe you've got some great hacking skills, and want to become a security professional? Look no further, this course starts you on your new and exciting path by diving into pentesting!
What you'll learn
So, you’re worried about how your network and your resources will withstand a cyber attack? That’s where a penetration test (often referred to as a pentest) comes into play. In this course, Laying the Foundation for Penetration Testing for CompTIA PenTest+, you’ll learn the basics of the types of pentests that are performed. First, you’ll learn the goals you’re trying to achieve. Next, you'll explore setting up a lab environment for pentesting. Finally, to protect you and your environment from accidental damage to your production network, you’ll discover how to set up the parameters within your new lab environment. By the end of this course, you'll gain a foundational understanding of the importance, and implementation, of pentesting.
Table of contents
- An Introduction to PenTest+ 3m
- What Is Pentesting? 2m
- Benefits of Pentesting 3m
- Frameworks and Standards 5m
- Frameworks and Standards (Continued) 5m
- Tools in Your Utility Belt: Scanning 4m
- Tools in Your Utility Belt: Credential Testing 4m
- Tools in Your Utility Belt: Debugging and Software Assurance 3m
- Tools in Your Utility Belt: OSINT and Wireless 5m
- Tools in Your Utility Belt: Web Proxy and Social Engineering 2m
- Tools in Your Utility Belt: Remote Access and Networking 3m
- Tools in Your Utility Belt: Mobile and Miscellaneous 5m
- Communication 10m
- Covering All You Bases 5m
- What You Learned 1m
- What You'll Learn 1m
- Gathering the Resources 7m
- Continuing to Gather the Resources 6m
- Demo: Installing Server 2016 7m
- Demo: Configuring Server 2016 8m
- Demo: Installing: Server 2019 6m
- Demo: Configure Server 2019 5m
- Demo: Installing and Configuring Windows 10 8m
- Demo: Installing and Configuring OWASP-BWA 9m
- Demo: Installing and Configuring Metasploitable 8m
- Demo: Some Housekeeping Items 2m
- What You Learned 1m