+1 (858) 208-4141
Blog |
Webinars |
Case Studies |
About |
Our Company
Our Team
Our Clients
BPPE
Accreditation & Partnerships
Careers
Opportunities for Instructors
Resources
FAQ
Contact
Category
`Live Courses by Practice Area
All `Live Courses by Practice Area
Analytics & BI
Application Development
Artificial Intelligence
Business & Project Management
Cloud
Cybersecurity
Database & ERP
Design & Multimedia
DevOPS
Diversity, Equity, Inclusion
Infra & Networking
Leadership & Professional Development
Office Applications
Process & Framework
Web Development
`Live Courses by Vendor
All `Live Courses by Vendor
Adobe
AWS
Cisco
Citrix
CompTIA
EC-Council
ISC2
ITIL
Microsoft
Mile2
Nutanix
Oracle
PECB
PeopleCert
PMI
QuickBooks
Tableau
VMware
eLearning Courses by Practice Area
All eLearning Courses by Practice Area
Analytics & BI
Application Development
Business & Project Management
Cloud
Cybersecurity
Database & ERP
Infra & Networking
eLearning Courses by Vendor
All eLearning Courses by Vendor
Cisco
CompTIA
EC-Council
ISC2
Mile2 Courses
PECB Courses
PeopleCert
Search for:
Search
Training
Live Courses by Practice Area
Cybersecurity
Analytics & BI
Cloud
Database & ERP
Infra & Networking
Application Development
Business & Project Management
Process & Framework
DevOPS
Design & Multimedia
Artificial Intelligence
Office Applications
Leadership & Professional Development
Live Courses by Vendor
ISC2
CompTIA
PECB
ITIL
PeopleCert
Diversity, Equity, Inclusion
EC-Council
PMI
Mile2
Nutanix
Microsoft
Cisco
AWS
VMware
Oracle
Citrix
QuickBooks
Adobe
Tableau
eLearning Courses by Practice Area
Analytics & BI
Application Development
Business & Project Management
Cloud
Cybersecurity
Database & ERP
Infra & Networking
eLearning Courses by Vendor
ISC2
Cisco
CompTIA
EC-Council
Mile2 Courses
PECB Courses
Bootcamps
Take a Career Quiz
Data Analytics & Engineering Bootcamp
Database Design and Administration
Student Financing
Climb Credit
Meritize
Enterprise Solutions
Recruit, Train, Place – Ramp Up 360°
Group Training – Level Up 360°
E-Learning – CCS 360°
Cybersecurity Awareness Training
Custom eLearning Solutions
Professional Development
Government Solutions
Military & Veteran
Army Cool | Army Credentialing Assistance
Air Force Cool | AF Credentialling Assistance
Coast Guard Cool | CG Credentialling Assistance
Employers: Hire Our Veteran Graduates
Working in IT for the U.S. DoD
Your Next Mission Podcast
About Us
Webinars
Case Studies
Contact
Blog
Home
Courses
CompTIA PenTest+ eLearning Bundle
Lessons
Lesson 1: Scoping Organization/Customer Requirements
Lesson List
Browse Q&A
Topics Covered
Lesson 1: Scoping Organization/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
Integrated Labs
Assisted Lab: Exploring the Lab Environment
Assisted Lab: Exploring the Domain Tools: Nslookup, Dig and Whois
Assisted Lab: Navigating Open-Source Intelligence Tools
Assisted Lab: Understanding Social Engineering Toolkit (SET)
APPLIED Lab: Understanding Spear Phishing and Credentials Attack
Assisted Lab: Exploring OpenVAS
Assisted Lab: Using Web Scanners
Assisted Lab: Understanding Nmap Common Usage
APPLIED Lab: Scanning a Vulnerable System
Assisted Lab: Understanding Scan Output
Assisted Lab: Navigating Steganography Tools
Assisted Lab: Demonstrating Enumeration Techniques
Assisted Lab: Exploring the Basics of Metasploit
APPLIED Lab: Using VSFTP Manual and Metasploit
Assisted Lab: Monitoring with Aircrack-ng
Assisted Lab: Discovering IoT devices with Shodan
Assisted Lab: Using SQL Injection
Assisted Lab: Using Reverse and Bind Shells
Assisted Lab: Analyzing Exploit Code
Assisted Lab: Exploring Programming Shells
Assisted Lab: Applying PenTest Automation
Assisted Lab: Exploring Password Attacks with John the Ripper and Hydra
This feature has been disabled by the administrator
Go to course home
Lesson 1: Scoping Organization/Customer Requirements
Training
Live Courses by Practice Area
Cybersecurity
Analytics & BI
Cloud
Database & ERP
Infra & Networking
Application Development
Business & Project Management
Process & Framework
DevOPS
Design & Multimedia
Artificial Intelligence
Office Applications
Leadership & Professional Development
Live Courses by Vendor
ISC2
CompTIA
PECB
ITIL
PeopleCert
Diversity, Equity, Inclusion
EC-Council
PMI
Mile2
Nutanix
Microsoft
Cisco
AWS
VMware
Oracle
Citrix
QuickBooks
Adobe
Tableau
eLearning Courses by Practice Area
Analytics & BI
Application Development
Business & Project Management
Cloud
Cybersecurity
Database & ERP
Infra & Networking
eLearning Courses by Vendor
ISC2
Cisco
CompTIA
EC-Council
Mile2 Courses
PECB Courses
Bootcamps
Take a Career Quiz
Data Analytics & Engineering Bootcamp
Database Design and Administration
Student Financing
Climb Credit
Meritize
Enterprise Solutions
Recruit, Train, Place – Ramp Up 360°
Group Training – Level Up 360°
E-Learning – CCS 360°
Cybersecurity Awareness Training
Custom eLearning Solutions
Professional Development
Government Solutions
Military & Veteran
Army Cool | Army Credentialing Assistance
Air Force Cool | AF Credentialling Assistance
Coast Guard Cool | CG Credentialling Assistance
Employers: Hire Our Veteran Graduates
Working in IT for the U.S. DoD
Your Next Mission Podcast
About Us
Webinars
Case Studies
Contact
Blog