Module 1 | Introduction | |
---|---|---|
Unit 1 | 1. Exam Foundations | |
Module 2 | Domain 1: Planning and Scoping | |
Unit 1 | 1. Planning and Scoping (Overview) | |
Unit 2 | 2. Penetration Testing Methodology | |
Unit 3 | 3. Planning a Penetration Test | |
Unit 4 | 4. Rules of Engagement | |
Unit 5 | 5. Legal Concepts | |
Unit 6 | 6. Testing Strategies | |
Unit 7 | 7. White Box Support Resources | |
Unit 8 | 8. Types of Assessments | |
Unit 9 | 9. Threat Actors | |
Unit 10 | 10. Target Selection | |
Module 3 | Domain 2: Information Gathering and Vulnerability Identification | |
Unit 1 | 1. Information Gathering and Vulnerability Identification (Overview) | |
Unit 2 | 2. Information Gathering | |
Unit 3 | 3. Reconnaissance with CentralOps (Demo) | |
Unit 4 | 4. Scanning and Enumeration | |
Unit 5 | 5. Fingerprinting | |
Unit 6 | 6. Scanning and Enumeration (Demo) | |
Unit 7 | 7. Cryptographic Inspection | |
Unit 8 | 8. Eavesdropping | |
Unit 9 | 9. Decompiling and Debugging | |
Unit 10 | 10. Open Source Research | |
Unit 11 | 11. Vulnerability Scanning | |
Unit 12 | 12. Scanning Considerations | |
Unit 13 | 13. Application and Container Scans | |
Unit 14 | 14. Analyzing Vulnerability Scans | |
Unit 15 | 15. Leverage Information for Exploit | |
Unit 16 | 16. Common Attack Vectors | |
Unit 17 | 17. Weaknesses in Specialized Systems | |
Module 4 | Domain 3: Attacks and Exploits | |
Unit 1 | 1. Attacks and Exploits (Overview) | |
Unit 2 | 2. Social Engineering | |
Unit 3 | 3. Motivation Factors | |
Unit 4 | 4. Physical Security Attacks | |
Unit 5 | 5. Lock Picking (Demo) | |
Unit 6 | 6. Network-based Vulnerabilities | |
Unit 7 | 7. Wireless-based Vulnerabilities | |
Unit 8 | 8. Wireless Network Attack (Demo) | |
Unit 9 | 9. Application-based Vulnerabilities | |
Unit 10 | 10. Local Host Vulnerabilities | |
Unit 11 | 11. Privilege Escalation (Linux) | |
Unit 12 | 12. Privilege Escalation (Windows) | |
Unit 13 | 13. Privilege Escalation | |
Unit 14 | 14. Privilege Escalation (Demo) | |
Unit 15 | 15. Lateral Movement | |
Unit 16 | 16. Persistence | |
Unit 17 | 17. Covering Your Tracks | |
Unit 18 | 18. Persistence and Covering Tracks (Demo) | |
Module 5 | Domain 4: Penetration Testing Tools | |
Unit 1 | 1. Penetration Testing Tools (Overview) | |
Unit 2 | 2. Nmap Usage | |
Unit 3 | 3. Nmap Usage (Demo) | |
Unit 4 | 4. Use Cases for Tools | |
Unit 5 | 5. Scanners | |
Unit 6 | 6. Credential Testing Tools | |
Unit 7 | 7. Password Cracking (Demo) | |
Unit 8 | 8. Debuggers | |
Unit 9 | 9. Software Assurance | |
Unit 10 | 10. OSINT | |
Unit 11 | 11. Wireless | |
Unit 12 | 12. Web Proxies | |
Unit 13 | 13. Social Engineering Tools | |
Unit 14 | 14. Remote Access Tools | |
Unit 15 | 15. Networking Tools | |
Unit 16 | 16. Mobile Tools | |
Unit 17 | 17. Miscellaneous Tools | |
Unit 18 | 18. Intro to Programming | |
Unit 19 | 19. Programming Concepts | |
Unit 20 | 20. BASH Script Example | |
Unit 21 | 21. Python Script Example | |
Unit 22 | 22. PowerShell Script Example | |
Unit 23 | 23. Ruby Script Example | |
Module 6 | Domain 5: Reporting and Communication | |
Unit 1 | 1. Reporting and Communication (Overview) | |
Unit 2 | 2. Pentest Communications | |
Unit 3 | 3. Report Writing | |
Unit 4 | 4. Mitigation Strategies | |
Unit 5 | 5. Post-Report Activities | |
Unit 6 | 6. Pentest Report Example |
Powered By WP Courseware