What’s included
- Content mapped to PenTest+ exam objectives (PT0-002)
- Videos present real-world cybersecurity scenarios from experts' experience
- Practice questions that check for understanding
- Access to the CompTIA Learning Center
What You’ll Learn
The Official CompTIA PenTest+ Student Guide (PT0-002) have been developed by CompTIA for the CompTIA PenTest+ candidate. Rigorously evaluated to validate coverage of the CompTIA PenTest+ (PT0-002) exam objectives, The Official CompTIA PenTest+ Instructor and Student Guides teach the knowledge and skills to understand how to plan and scope a penetration testing engagement including vulnerability scanning, understand legal and compliance requirements, analyze results, and produce a written report with remediation techniques and prepare candidates to take the CompTIA PenTest+ certification exam.
Accessing the Course Materials
An access key and instructions for accessing the CompTIA Learning Center, the online platform through which the eBook and all digital materials as described above are delivered, are emailed within 3-4 hours of purchase. The eBook is provided in an interactive online version, along with a downloadable PDF.
Access keys must be redeemed within 12 months of purchase
Product Information
ISBN: 978-1-64274-374-6
Pub. Date: 2021-10-26
Author(s): Lisa Bock, Henry Flefel, Phil Morgan, Rie Vainstein (NC-Expert)
Table of Contents
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities