Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address
Loading...
CompTIA PenTest+ Certification Exam Video Course

PT0-002: CompTIA PenTest+ Certification Exam

Your CompTIA PT0-002 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the PT0-002 certification test. Ace your CompTIA PT0-002 at the first attempt and obtain the CompTIA PenTest+ Certification Exam credential with ease.

# of Students
137
# of Lectures
237
Course Length
7 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for PT0-002 Video Course

Planning an Engagement

  Video Name Time
  1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3) 2:26
  2. Risk (OBJ 1.2) 9:11
  3. Risk Handling (OBJ 1.2) 7:52
  4. Controls (OBJ 1.2) 7:30
  5. PenTest Methodologies (OBJ 1.2) 7:55
  6. PenTest Standards (OBJ 1.2) 7:06
  7. Planning a Test (OBJ 1.2) 9:39
  8. Legal Concepts (OBJ 1.1) 8:20
  9. Regulatory Compliance (OBJ 1.1) 15:16
  10. Professionalism (OBJ 1.3) 10:31
  Video Name Time
  1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3) 3:35
  2. Defining the Scope (OBJ 1.2) 6:57
  3. Adversary Emulation (OBJ 1.2) 11:54
  4. Target List (OBJ 1.2) 10:56
  5. Identifying Restrictions (OBJ 1.1) 8:01
  6. Rules of Engagement (OBJ 1.2) 7:45
  7. Assessment Types (OBJ 1.3) 8:59
  8. Validating the Scope (OBJ 1.2) 5:17
  9. Limitations and Permission (OBJ 1.1 and 1.3) 6:57
  10. Build a Virtual Lab 16:39
  Video Name Time
  1. Passive Reconnaissance (OBJ 2.1) 2:39
  2. Information Gathering (OBJ 2.1) 5:57
  3. Open-Source Intelligence (OSINT) (OBJ 2.1) 5:36
  4. Social Media Scraping (OBJ 2.1) 2:29
  5. OSINT Tools (OBJ 2.1) 11:43
  6. Using OSINT Tools (OBJ 2.1) 26:35
  7. DNS Information (OBJ 2.1) 9:04
  8. Reconnaissance with CentralOps (OBJ 2.1) 13:05
  9. Public Repositories (OBJ2.1) 4:40
  10. Search Engine Analysis (OBJ 2.1) 6:21
  11. URL Analysis (OBJ 2.1) 15:20
  12. Cryptographic Flaws (OBJ 2.1) 16:31
  13. CWE & CVE (OBJ 2.1) 6:24
  Video Name Time
  1. Active Reconnaissance (OBJ 2.2 and 2.3) 2:19
  2. Scanning and Enumeration (OBJ 2.2 and 2.3) 10:07
  3. Conducting Enumeration (OBJ 2.3) 14:57
  4. Other Enumeration (OBJ 2.2 and 2.3) 9:24
  5. Website Reconnaissance (OBJ 2.3) 8:45
  6. Detecting and Evading Defenses (OBJ 2.2) 9:47
  7. Packet Crafting (OBJ 2.2) 10:29
  8. Eavesdropping (OBJ 2.2) 10:15
  9. Wardriving (OBJ 2.2) 8:17
  10. DNS and ARP Analysis (OBJ 2.3) 23:00
  11. Network Traffic Analysis (OBJ 2.3) 17:53
  Video Name Time
  1. Vulnerability Scanning (OBJ 2.3 and 2.4) 1:57
  2. Vulnerability Lifecycle (OBJ 2.3 and 2.4) 8:36
  3. Vulnerability Scans (OBJ 2.3 and 2.4) 11:10
  4. Scanning Considerations (OBJ 2.3 and 2.4) 9:22
  5. Nessus Scanning (OBJ 2.3 and 2.4) 9:09
  6. OpenVas Scanning (OBJ 2.3 and 2.4) 13:35
  7. Nikto Scanning (OBJ 2.3 and 2.4) 5:19
  Video Name Time
  1. Nmap (OBJ 2.3 and 2.4) 2:31
  2. Nmap Discovery Scans (OBJ 2.3 and 2.4) 7:54
  3. Nmap Port Scans (OBJ 2.3 and 2.4) 9:13
  4. Nmap Fingerprinting (OBJ 2.3 and 2.4) 4:13
  5. Using Nmap (OBJ 2.3 and 2.4) 11:32
  6. Nmap Scripting Engine (OBJ 2.3 and 2.4) 20:21
  Video Name Time
  1. Social Engineering and Physical Attacks (OBJ 3.6) 3:36
  2. Methods of Influence (OBJ 3.6) 11:11
  3. Social Engineering (OBJ 3.6) 14:00
  4. Phishing Campaigns (OBJ 3.6) 5:14
  5. Social Engineering Toolkit (OBJ 3.6) 13:38
  6. Pretexting (OBJ 3.6) 4:08
  7. Baiting Victims (OBJ 3.6) 5:49
  8. Impersonation (OBJ 3.6) 4:17
  9. Physical Security (OBJ 3.6) 15:43
  10. Lock Picking (OBJ 3.6) 1:37
  11. Physical Attacks (OBJ 3.6) 10:25
  12. Social Engineering Tools (OBJ 3.6) 4:15
  Video Name Time
  1. Wireless Attacks (OBJ 3.2) 3:24
  2. Wireless Security (OBJ 3.2) 16:38
  3. Bypassing MAC Filtering (OBJ 3.2) 4:08
  4. Signal Exploitation (OBJ 3.2) 11:16
  5. WEP Hacking (OBJ 3.2) 9:22
  6. WPA/WPA2 Hacking (OBJ 3.2) 8:37
  7. WPS PIN Attacks (OBJ 3.2) 11:45
  8. Evil Twins (OBJ 3.2) 5:53
  9. On-path and Relay Attacks (OBJ 3.2) 4:47
  10. Bluetooth Attacks (OBJ 3.2) 5:50
  11. RFID and NFC Attacks (OBJ 3.2) 4:46
  Video Name Time
  1. Network Attacks (OBJ 3.1) 2:30
  2. Stress Testing (OBJ 3.1) 6:33
  3. Exploit Resources (OBJ 3.1) 6:23
  4. ARP Poisoning (OBJ 3.1) 7:17
  5. DNS Cache Poisoning (OBJ 3.1) 12:37
  6. LLMNR/NBT-NS Poisoning (OBJ 3.1) 4:50
  7. MAC Spoofing (OBJ 3.1) 5:23
  8. VLAN Hopping (OBJ 3.1) 6:56
  9. NAC Bypass (OBJ 3.1) 4:51
  10. On-path Attack (OBJ 3.1) 3:58
  11. Password Attacks (OBJ 3.1) 10:09
  12. Pass the Hash (OBJ 3.1) 7:55
  13. Intro to Metasploit (OBJ 3.1) 18:53
  14. Netcat (OBJ 3.1) 7:41
  15. Using Netcat (OBJ 3.1) 10:59
  Video Name Time
  1. Application Vulnerabilities (OBJ 3.3) 5:43
  2. Race Conditions (OBJ 3.3) 4:55
  3. Buffer Overflows (OBJ 3.3) 12:23
  4. Buffer Overflow Attacks (OBJ 3.3) 6:25
  5. Authentication and References (OBJ 3.3) 4:44
  6. Improper Error Handling (OBJ 3.3) 5:11
  7. Improper Headers (OBJ 3.3) 6:06
  8. Code Signing (OBJ 3.3) 1:56
  9. Vulnerable Components (OBJ 3.3) 11:42
  10. Software Composition (OBJ 3.3) 9:46
  11. Privilege Escalation (OBJ 3.3) 6:09
  12. Conducting Privilege Escalation (OBJ 3.3) 13:06
  Video Name Time
  1. Application Attacks (OBJ 3.3) 2:36
  2. Directory Traversals (OBJ 3.3) 9:32
  3. Dirbuster (OBJ 3.3) 7:15
  4. Cross-Site Scripting (XSS) (OBJ 3.3) 8:56
  5. Cross-Site Request Forgery (CSRF) (OBJ 3.3) 7:10
  6. SQL Injections (OBJ 3.3) 6:58
  7. Conducting SQL Injections (OBJ 3.3) 8:26
  8. Burp Suite and SQLmap (OBJ 3.3) 10:06
  9. OWASP ZAP (OBJ 3.3) 2:49
  10. XML Injections (OBJ 3.3) 6:20
  11. Other Injection Attacks (OBJ 3.3) 3:21
  12. Attacking Web Applications (OBJ 3.3) 15:36
  Video Name Time
  1. Cloud Attacks (OBJ 3.4) 2:08
  2. Attacking the Cloud (OBJ 3.4) 6:54
  3. Credential Harvesting (OBJ 3.4) 8:17
  4. Misconfigured Assets (OBJ 3.4) 12:12
  5. Metadata Service Attack (OBJ 3.4) 4:32
  6. Software Development Kit (SDK) (OBJ 3.4) 2:55
  7. Auditing the Cloud (OBJ 3.4) 5:04
  8. Conducting Cloud Audits (OBJ 3.4) 13:59
  Video Name Time
  1. Attacks on Mobile Devices (OBJ 3.5) 4:46
  2. Enterprise Mobility Management (OBJ 3.5) 9:32
  3. Deployment Options (OBJ 3.5) 4:34
  4. Mobile Reconnaissance Concerns (OBJ 3.5) 7:57
  5. Mobile Device Insecurity (OBJ 3.5) 12:15
  6. Multifactor Authentication (OBJ 3.5) 12:11
  7. Mobile Device Attacks (OBJ 3.5) 5:14
  8. Malware Analysis (OBJ 3.5) 13:13
  9. Conducting Malware Analysis (OBJ 3.5) 25:55
  10. Mobile Device Tools (OBJ 3.5) 8:21
  Video Name Time
  1. Attacks on Specialized Systems (OBJ 3.5) 2:44
  2. Internet of Things (IoT) Devices (OBJ 3.5) 8:17
  3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5) 7:35
  4. Embedded Systems (OBJ 3.5) 6:45
  5. ICS and SCADA Devices (OBJ 3.5) 9:16
  6. ICS Protocols and Vulnerabilities (OBJ 3.5) 10:51
  7. Data Storage Vulnerabilities (OBJ 3.5) 5:58
  8. Virtual Environments (OBJ 3.5) 8:16
  9. Virtual Machine Attacks (OBJ 3.5) 5:56
  10. Containerization (OBJ 3.5 5:45
  Video Name Time
  1. Post-exploitation (OBJ 3.7) 2:51
  2. Enumerating the Network (OBJ 3.7) 4:04
  3. Network Segmentation Testing (OBJ 3.7) 3:10
  4. Lateral Movement and Pivoting (OBJ 3.7) 2:58
  5. Pass the Hash (OBJ 3.7) 7:49
  6. Golden Ticket (OBJ 3.7) 6:05
  7. Lateral Movement (OBJ 3.7) 8:31
  8. Pivoting (3.7) 7:42
  9. Escalating Privileges (OBJ 3.7) 19:14
  10. Upgrading Restrictive Shells (OBJ 3.7) 5:26
  Video Name Time
  1. Detection Avoidance (OBJ 3.7) 1:31
  2. Trojans and Backdoors (OBJ 3.7) 4:20
  3. Creating Persistence (OBJ 3.7) 13:51
  4. Living Off the Land (OBJ 3.7) 12:01
  5. Data Exfiltration (OBJ 3.7) 6:46
  6. Covert Channels (OBJ 3.7) 4:44
  7. Steganography (3.7) 2:58
  8. Covering Your Tracks (OBJ 3.7) 10:03
  9. Persistence and Covering Your Tracks (OBJ 3.7) 8:44
  10. Post-Exploitation Tools (OBJ 3.7) 3:00
  Video Name Time
  1. Communication and Reports (OBJ 4.3) 1:44
  2. Communication Paths (OBJ 4.3) 5:25
  3. Communication Triggers (OBJ 4.3) 4:36
  4. Reasons for Communication (OBJ 4.3) 10:18
  5. Presentation of Findings (4.1 & OBJ 4.3) 6:05
  6. Report Data Gathering (OBJ 4.1) 3:38
  7. Written Reports (OBJ 4.1) 14:44
  8. Common Themes (OBJ 4.1) 3:01
  9. Securing and Storing Reports (OBJ 4.1) 5:06
  Video Name Time
  1. Findings and Remediations (OBJ 4.2) 2:32
  2. Security Control Categories (OBJ 4.2) 13:35
  3. Selecting Security Controls (OBJ 4.2) 3:56
  4. Physical Controls (OBJ 4.2) 6:55
  5. Operational Controls (OBJ 4.2) 10:22
  6. Administrative Controls (OBJ 4.2) 14:23
  7. System Hardening (OBJ 4.2) 10:55
  8. Secure Coding (OBJ 4.2) 8:19
  9. Implementing MFA (OBJ 4.2) 6:21
  10. Digital Certificates (OBJ 4.2) 9:47
  11. Other Technical Controls (OBJ 4.2) 2:41
  12. Mitigation Strategies (OBJ 4.2) 8:07
  Video Name Time
  1. Post-report Activities (OBJ 4.2) 2:42
  2. Removing Shells and Tools (OBJ 4.2) 2:53
  3. Deleting Test Credentials (OBJ 4.2) 1:53
  4. Destroy Test Data (OBJ 4.2) 2:51
  5. Client Acceptance (OBJ 4.2) 2:57
  6. Attestation of Findings (OBJ 4.2) 3:00
  7. Lessons Learned (OBJ 4.2) 4:04
  8. Retesting (OBJ 4.2) 2:42
  Video Name Time
  1. Scripting Basics (OBJ 5.1 & OBJ 5.2) 2:24
  2. Scripting Tools (OBJ 5.2) 9:50
  3. Variables (OBJ 5.1) 7:52
  4. Loops (OBJ 5.1) 5:20
  5. Logic Control (OBJ 5.1) 4:35
  6. Data Structures (OBJ 5.1) 12:40
  7. Object Oriented Programming (OBJ 5.1) 6:59
  Video Name Time
  1. Analyzing Scripts (OBJ 5.2) 5:18
  2. Coding in Bash (OBJ 5.2) 21:17
  3. Bash Example (OBJ 5.2) 4:35
  4. Coding in PowerShell (OBJ 5.2) 15:41
  5. PowerShell Example (OBJ 5.2) 3:25
  6. Coding in Python (OBJ 5.2) 19:52
  7. Python Example (OBJ 5.2) 3:40
  8. Coding in Perl (OBJ 5.2) 17:24
  9. Perl Example (OBJ 5.2) 16:11
  10. Coding in JavaScript (OBJ 5.2) 19:22
  11. JavaScript Example (OBJ 5.2) 9:48
  12. Coding in Ruby (OBJ 5.2) 13:43
  13. Ruby Example (OBJ 5.2) 4:15
  Video Name Time
  1. Exploits and Automation (OBJ 5.2) 1:37
  2. Exploits to Download Files (OBJ 5.2) 4:27
  3. Exploits for Remote Access (OBJ 5.2) 9:26
  4. Exploits for Enumerating Users (OBJ 5.2) 5:57
  5. Exploits for Enumerating Assets (OBJ 5.2) 5:24
  6. Automation in Engagements (OBJ 5.2) 3:28
  7. Automation with Nmap Scripts (OBJ 5.2) 2:35
  Video Name Time
  1. Tool Round-up (OBJ 5.3) 2:54
  2. OSINT Tools (OBJ 5.3) 6:14
  3. Scanning Tools (OBJ 5.3) 6:40
  4. Networking Tools (OBJ 5.3) 2:31
  5. Wireless Tools (OBJ 5.3) 7:37
  6. Social Engineering Tools (OBJ 5.3) 2:36
  7. Remote Access Tools (OBJ 5.3) 4:24
  8. Credential Testing Tools (OBJ 5.3) 7:39
  9. Web Application Tools (OBJ 5.3) 2:26
  10. Cloud Tools (OBJ 5.3) 2:59
  11. Steganography Tools (OBJ 5.3) 6:35
  12. Debuggers (OBJ 5.3) 5:32
  13. Miscellaneous Tools (OBJ 5.3) 9:27
  Video Name Time
  1. Conclusion 9:13

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step