Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Post-Exploit Tasks for CompTIA PenTest+

This course (part 9 in the PenTest+ series) focuses on methods of evading security countermeasures, maintaining access and covering your tracks.

Intermediate
1h 18m
(21)

Created by Dale Meredith

Last Updated Apr 29, 2022

Course Thumbnail
  • Course

Post-Exploit Tasks for CompTIA PenTest+

This course (part 9 in the PenTest+ series) focuses on methods of evading security countermeasures, maintaining access and covering your tracks.

Intermediate
1h 18m
(21)

Created by Dale Meredith

Last Updated Apr 29, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

You have identified the big computing assets that an enterprise wants to keep protected — networks, hosts, and applications — and have done what you can to exploit their vulnerability. This is the core phase of any penetration testing engagement, but you are not done. You need to engage in post-exploitation activities to escape security countermeasures and maintain a foothold in the organization, long though the main actions have been accomplished.

In this course, Post Exploit Tasks for CompTIA PenTest+, you will gain understanding of the steps and techniques that you can use during this phase and the engagement. First, you will learn different lateral movement techniques that allow you make the most impact of the exploits you have already discovered. Once you understand this, you will learn about pivoting through port forwarding, VPNs, SSH, and others. Next, you will explore the different ways you can maintain persistence within the target network without drawing much attention to your self. Finally, you will use specific anti-forensics techniques to avoid software that is designed to catch you and your activities

When you are finished with this course, you will have the skills and knowledge of penetration tester needed to complete your post-exploit tasks on any any engagement.

Software required: [software required.] *

  • Setting up the Lab environment from the "Laying the Foundation for Penetration Testing for CompTIA PenTest+" course.

Post-Exploit Tasks for CompTIA PenTest+
Intermediate
1h 18m
(21)
Table of contents

About the author
Dale Meredith  - Pluralsight course - Post-Exploit Tasks for CompTIA PenTest+
Dale Meredith
74 courses 4.5 author rating 5692 ratings

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

Get started with Pluralsight