Penetrating Networks for CompTIA PenTest+

Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization.
Course info
Rating
(52)
Level
Beginner
Updated
Jan 28, 2020
Duration
2h 9m
Table of contents
Description
Course info
Rating
(52)
Level
Beginner
Updated
Jan 28, 2020
Duration
2h 9m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Connecting computing devices together to share files and other resources is certainly an essential part of today's computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it's basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement. .

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
Cloud and Automation for CompTIA CySA+
Intermediate
56m
Dec 11, 2020
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, everyone. My name is Dale Meredith, and I want to welcome you to my course, Penetrating Networks for CompTIA PenTest+. Now this course is part 6 in a series for the CompTIA PenTest+ certification program. But guess what? If you know me, you know that this isn't going to be just a course about the certification and the information we need to know. We'll also cover other information that's more real world, and some of it's based off of my own experiences. But wait, there's more. In this course, we're going to dive in to how we can exploit several different vectors that are present on almost every network infrastructure. You'll first learn the commonalities that all networks have that create these different attack vectors. Next, you'll discover how different protocols all present different issues that can be exploited during a penetration test, including man‑in‑the‑middle attacks or ARP poisoning, brute force attacks, pass the hash, and the hits just keep on going. After that, you'll learn some of the network services that actually create vulnerabilities just through their normal day‑to‑day functions. Finally, you'll learn about how wireless networks continue to be an attacker's favorite attack vector because of how easy it is to exploit from WPS attacks to fragmentation attacks to even jamming and deauth attacks. Now by the end of this course, you should have a better understanding of the systems and services that are on the network that you can use to exploit during a pen test engagement. Now please don't jump into this course without watching the first five courses in this series, especially the first course. In this course, we set up the lab environment that you'll see me use in my demos, and I'd like you to be able to follow along. As far as additional prerequisites are concerned, you really should have a good background in networking, the devices on networks, the security of networks. I'd actually recommend checking out our Security+ series here, at Pluralsight. Now after you're finished watching this course, you'll feel lot more comfortable as you'll be able to dive further into this series. I would even go back and look at some of our ethical hacking courses here as well. Now that author knows what he's talking about. I hope you join me in this learning and understanding of concepts of Penetrating Networks for CompTIA PenTest+ here, at Pluralsight.