Module 1 Introduction
Unit 1 1. Exam Foundations  
Module 2 Domain 1: Planning and Scoping
Unit 1 1. Planning and Scoping (Overview)  
Unit 2 2. Penetration Testing Methodology  
Unit 3 3. Planning a Penetration Test  
Unit 4 4. Rules of Engagement  
Unit 5 5. Legal Concepts  
Unit 6 6. Testing Strategies  
Unit 7 7. White Box Support Resources  
Unit 8 8. Types of Assessments  
Unit 9 9. Threat Actors  
Unit 10 10. Target Selection  
Module 3 Domain 2: Information Gathering and Vulnerability Identification
Unit 1 1. Information Gathering and Vulnerability Identification (Overview)  
Unit 2 2. Information Gathering  
Unit 3 3. Reconnaissance with CentralOps (Demo)  
Unit 4 4. Scanning and Enumeration  
Unit 5 5. Fingerprinting  
Unit 6 6. Scanning and Enumeration (Demo)  
Unit 7 7. Cryptographic Inspection  
Unit 8 8. Eavesdropping  
Unit 9 9. Decompiling and Debugging  
Unit 10 10. Open Source Research  
Unit 11 11. Vulnerability Scanning  
Unit 12 12. Scanning Considerations  
Unit 13 13. Application and Container Scans  
Unit 14 14. Analyzing Vulnerability Scans  
Unit 15 15. Leverage Information for Exploit  
Unit 16 16. Common Attack Vectors  
Unit 17 17. Weaknesses in Specialized Systems  
Module 4 Domain 3: Attacks and Exploits
Unit 1 1. Attacks and Exploits (Overview)  
Unit 2 2. Social Engineering  
Unit 3 3. Motivation Factors  
Unit 4 4. Physical Security Attacks  
Unit 5 5. Lock Picking (Demo)  
Unit 6 6. Network-based Vulnerabilities  
Unit 7 7. Wireless-based Vulnerabilities  
Unit 8 8. Wireless Network Attack (Demo)  
Unit 9 9. Application-based Vulnerabilities  
Unit 10 10. Local Host Vulnerabilities  
Unit 11 11. Privilege Escalation (Linux)  
Unit 12 12. Privilege Escalation (Windows)  
Unit 13 13. Privilege Escalation  
Unit 14 14. Privilege Escalation (Demo)  
Unit 15 15. Lateral Movement  
Unit 16 16. Persistence  
Unit 17 17. Covering Your Tracks  
Unit 18 18. Persistence and Covering Tracks (Demo)  
Module 5 Domain 4: Penetration Testing Tools
Unit 1 1. Penetration Testing Tools (Overview)  
Unit 2 2. Nmap Usage  
Unit 3 3. Nmap Usage (Demo)  
Unit 4 4. Use Cases for Tools  
Unit 5 5. Scanners  
Unit 6 6. Credential Testing Tools  
Unit 7 7. Password Cracking (Demo)  
Unit 8 8. Debuggers  
Unit 9 9. Software Assurance  
Unit 10 10. OSINT  
Unit 11 11. Wireless  
Unit 12 12. Web Proxies  
Unit 13 13. Social Engineering Tools  
Unit 14 14. Remote Access Tools  
Unit 15 15. Networking Tools  
Unit 16 16. Mobile Tools  
Unit 17 17. Miscellaneous Tools  
Unit 18 18. Intro to Programming  
Unit 19 19. Programming Concepts  
Unit 20 20. BASH Script Example  
Unit 21 21. Python Script Example  
Unit 22 22. PowerShell Script Example  
Unit 23 23. Ruby Script Example  
Module 6 Domain 5: Reporting and Communication
Unit 1 1. Reporting and Communication (Overview)  
Unit 2 2. Pentest Communications  
Unit 3 3. Report Writing  
Unit 4 4. Mitigation Strategies  
Unit 5 5. Post-Report Activities  
Unit 6 6. Pentest Report Example  
Powered By WP Courseware