You are here

CompTIA PenTest PT0-001

Primary tabs

Resell This Course

Request A Demo

About Our Platform

About Our Courses

CompTIA PenTest + पैठ परीक्षण और भेद्यता प्रबंधन के साथ काम करने वाले साइबर सुरक्षा पेशेवरों के लिए है। कॉम्पिटिया पेनटेस्ट + एक एकमात्र पैठ परीक्षण परीक्षा है जो दोनों हाथों से, प्रदर्शन-आधारित प्रश्नों और बहु-विकल्प के साथ पियर्सन VUE परीक्षण केंद्र में ली गई है, यह सुनिश्चित करने के लिए कि प्रत्येक उम्मीदवार के more

Module 1 - The Pen Test Engagement

1.0 PenTest Plus Introduction

1.1 PenTest Plus Topics

1.2 PenTest Engagement

1.3 Threat Modeling

1.4 Technical Constraints

1.5 PenTest Engagement Review

1.6 Examining PenTest Engagement Documents Act

Module 2 - Passive Reconnaissance

2.1 Passive Reconnaissance part1

2.2 WHOIS Act

2.3 Passive Reconnaissance part2

2.4 Google Hacking Act

2.5 Passive Reconnaissance part3

2.6 DNS Querying Act

2.7 Passive Reconnaissance part4

2.8 Email Server Querying Act

2.9 SSL-TLS Cerfificates

2.10 Shodan Act

2.11 The Havester

2.12 TheHarvester Act

2.13 Recon-ng

2.14 Recon-g Act

2.14 Recon-ng-Part-2-API-key Act

2.15 Maltego

2.16 Have I been Pwned

2.17 Punked and Owned Pwned Act

2.18 Fingerprinting Organization with Collected Archives

2.19 FOCA Act

2.20 Findings Analysis Weaponization

2.21 Chp 2 Review

Module 3 - Active Reconnaissance

3.1 Active Reconnaissannce

3.2 Discovery Scans Act

3.3 Nmap

3.4 Nmap Scans Types Act

3.5 Nmap Options

3.6 Nmap Options Act

3.7 Stealth Scans

3.8 Nmap Stealth Scans Act

3.9 Full Scans

3.10 Full Scans Act

3.11 Packet Crafting

3.12 Packet Crafting Act

3.13 Network Mapping

3.14 Metasploit

3.15 Scanning with Metasploit Act

3.16 Enumeration

3.17 Banner Grabbing Act

3.18 Windows Host Enumeration

3.19 Winddows Host Enumeration Act

3.20 Linux Host Enumeration

3.21 Linux Host Enumeration Act

3.22 Service Enumeration

3.23 Service Enumeration Act

3.24 Network Shares

3.25 SMB Share Enumeration Act

3.26 NFS Network Share Enumeration

3.27 NFS Share Enumeration Act

3.28 Null Sessions

3.29 Null Sessions Act

3.30 Website Enumeration

3.31 Website Enumeration Act

3.32 Vulnerability Scans

3.33 Compliance Scans Act

3.34 Credentialed Non-credentialed Scans

3.35 Using Credentials in Scans Act

3.36 Server Service Vulnerability Scan

3.37 Vulnerability Scanning Act

3.38 Web Server Database Vulnerability Scan

3.39 SQL Vulnerability Scanning Act

3.40 Vulnerability Scan Part 2 OpenVAS Act

3.41 Web App Vulnerability Scan

3.42 Web App Vulnerability Scanning Act

3.43 Network Device Vulnerability Scan

3.44 Network Device Vuln Scanning Act

3.45 Nmap Scripts

3.46 Using Nmap Scripts for Vuln Scanning Act

3.47 Packet Crafting for Vulnerbility Scans

3.48 Firewall Vulnerability Scans

3.49 Wireless Access Point Vunerability

3.50 Wireless AP Scans Act

3.51 WAP Vulnerability Scans

3.52 Container Security issues

3.53 How to Update Metasploit Pro Expired Trial License

Module 4 - Physical Security

4.1 Physical Security

4.2 Badge Cloning Act

4.3 Physical Security Review

Module 5 - Social Engineering

5.1 Social Engineering

5.2 Using Baited USB Stick Act

5.3 Using Social Enginnering to Assist Attacks

5.4 Phishing Act

5.5 Social Engineering Review

Module 6 - Vulnerability Scan Analysis

6.1 Vulnerbility Scan Analysis

6.2 Validating Vulnerability Scan Results Act

6.3 Vulnerbility Scan Analysis Review

Module 7 - Password Cracking

7.1 Password Cracking

7.2 Brute Force Attack Against Network Service Act

7.3 Network Authentication Interception Attack

7.4 Intercepting Network Authentication Act

7.5 Pass the Hash Attacks

7.6 Pass the Hash Act

7.7 Password Cracking Review

Module 8 - Penetrating Wired Networks

8.1 Penetrating Wired Network

8.2 Sniffing Act

8.3 Eavesdropping

8.4 Eavesdropping Act

8.5 ARP Poisoning

8.6 ARP Poisoning Act

8.7 Man In The Middle

8.8 MITM Act

8.9 TCP Session HiJacking

8.10 Server Message Blocks SMB Exploits

8.11 SMB Attack Act

8.12 Web Server Attacks

8.13 FTP Attacks

8.14 Telnet Server Attacks

8.15 SSH Server Attacks

8.16 Simple Network Mgmt Protocol SNMP

8.17 Simple Mail Transfer Protocol SMTP

8.18 Domain Name System DNS Cache Poisoning

8.19 Denail of Service Attack DoS-DDoS

8.20 DoS Attack Act

8.21 VLAN Hopping Review

Module 9 - Penetrating Wireless Networks

9.1 Penetrating Wireless Networks

9.2 Jamming Act

9.3 Wireless Sniffing

9.4 Replay Attacks

9.5 WEP Cracking Act

9.6 WPA-WPA2 Cracking

9.7 WAP Cracking Act

9.8 Evil Twin Attacks

9.9 Evil Twin Attack Act

9.10 WiFi Protected Setup

9.11 Bluetooth Attacks

9.12 Penetrating Wireless Networks

Module 10 - Windows Exploits

10.1 Windows Exploits

10.2 Dumping Stored Passwords Act

10.3 Dictionary Attacks

10.4 Dictionary Attack Against Windows Act

10.5 Rainbow Table Attacks

10.6 Credential Brute Force Attacks

10.7 Keylogging Attack Act

10.8 Windows Kernel

10.9 Kernel Attack Act

10.10 Windows Components

10.11 Memory Vulnerabilities

10.12 Buffer Overflow Attack Act

10.13 Privilegde Escalation in Windows

10.14 Windows Accounts

10.15 Net and WMIC Commands

10.16 Sandboxes

Module 11 - Linux Exploits

11.1 Linux Exploits

11.2 Exploiting Common Linux Features Act

11.3 Password Cracking in Linux

11.4 Cracking Linux Passwords Act

11.5 Vulnerability Linux

11.6 Priviledge Escalation Linux

11.7 Linux Accounts

11.8 Linux Exploits Review

Module 12 - Mobile Devices

12.1 Mobile Devices

12.2 Hacking Android Act

12.3 Apple Exploits

12.4 Moblie Devices Review

Module 13 - Specialized Systems

13.1 Specialized Systems

13.2 Specialized Systems Review

Module 14 - Scripts

14.1 Scripts

14.2 Powershell

14.3 Python

14.4 Ruby

14.5 Common Scripting Elements

14.6 Scripts Review

14.7 Better Ping Sweep

14.8 Simple Port Scanner2

14.9 Multitarget Port Scanner

14.10 Port Scanner with Nmap

14.11 Scripts Review

Module 15 - Application Testing

15.1 Application Testing

15.2 Reverse Engineering

Module 16 - Web App Exploits

16.1 Webb App Exploits

16.2 Injection Attacks

16.3 HTML Injection

16.4 SQL Hacking - SQLmap Act

16.5 Cross-Site Attacks

16.6 Cross-Site Request Forgery

16.7 Other Web-based Attacks

16.8 File Inclusion Attacks

16.9 Web Shells

16.10 Web Shells Review

Module 17 - Lateral Movement

17.1 Lateral Movement

17.2 Lateral Movement with Remote Mgmt Services

17.3 Process Migration Act

17.4 Passing Control Act

17.5 Pivoting

17.6 Tools the Enable Pivoting

17.7 Lateral Movement Review

Module 18 - Persistence

18.1 Persistence

18.2 Breeding RATS Act

18.3 Bind and Reverse Shells

18.4 Bind Shells Act

18.5 Reverse Shells

18.6 Reverse Shells Act

18.7 Netcat

18.8 Netcat Act

18.9 Scheduled Tasks

18.10 Scheduled Tasks Act

18.11 Services and Domains

18.12 Persistence Review

Module 19 - Cover Your Tracks

19.1 Cover Your Tracks

19.2 Cover Your Tracks - Timestomp Files Act

19.3 Cover Your Tracks - Frame the Administrator Act

19.4 Cover Your Tracks - Clear the Event Log Act

19.5 Cover Your Tracks Review

Module 20 - The Report

20.1 The Report

20.2 The Report Review

Module 21 - Post Engagement Cleanup

21.1 Post Engagement Cleanup

21.1 Post Engagement Cleanup_1

21.3 Post Engagement Cleanup Review

21.4 PenTest Plus Conclusion.mp4

What learning resources are included?

Expert-led Video Courses

Our courses are video-based, expert instructor-led E-Learning, set in an advanced self-study format with enhanced user controls which offer a much better learning experience compared to traditional classroom training.

Unlike classroom-based training, you can play, pause, forward, rewind and repeat courses and learn at your own pace – anytime, anywhere.

Also included in the videos are demonstrations and visual presentations that allow students to develop their skills, based on real-world scenarios.

Our courses combine proven learning methodologies with the latest technology, ensuring that you have the tools you need to succeed and that you get the most value from your IT training investment.


Each course includes quizzes that measure your skills growth as you progress through your course as well as assess your readiness before you take the official certification exam. This allows you to gain confidence in preparation for the exam and helps ensure that you pass the exam the first time around.

Flash Cards & Educational Games

Students learn in different ways using different learning tools. That is why, in addition to the course videos and quizzes, we provide Flash Cards and Education Games for our courses. This will allow you to train in ways that keep you engaged and focused. Each course has dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to ensure optimized retention levels of the material.

Navigation & Controls

Our self-paced training programs are designed in a modular fashion that allows you the flexibility to work with expert level instruction anytime, anywhere. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training.

Discussion Board

Each course contains a discussion-board section where students can engage with one another. Ask questions, get advice and join in-group conversations as it relates to the particular course.

For how long will I be able to access the course?

The standard subscription period is one year. This can sometimes be longer, depending on if you have purchased courses on a promotion that specifically provides a longer access period.

If the access period is longer than one year, it will be indicated in the promotion.

Who presents the courses?

We only use the industry’s finest instructors. They have a minimum of 15 years’ experience, are subject matter experts in their fields and hold all the qualifications that are relevant to the particular certification.

Our instructors not only prepare you for your exams but also provides practical examples and scenarios based on real-world experience.

What Are The Requirements?


All our courses require an acumen for information technology, basic knowledge of computers, and experience in working with Microsoft Windows and internet browsers. All courses are presented in English and a good knowledge and understanding of English is essential.

In addition, each individual certification program has its own academic requirements. The prerequisite knowledge and experience required for each certification is available on the website of the respective certification vendor (CompTIA, Microsoft, Cisco etc.). It is of paramount importance that you ensure that you meet all the requirements (as set-out on the certification vendor’s website) before you enroll in a course.


  • A laptop or desktop computer with Microsoft Windows
  • An internet browser (Google Chrome, Internet Explorer, Firefox) that is up to date
  • High-speed/broadband internet access
  • Speakers or earphones

Can I view a course before I buy?


Yes. If you would like to view a demo of the course, please contact us and we will arrange an access to a demo for you.

What if I am not happy with the course I have purchased?

If for any reason you are not satisfied with your purchase, we will give you your money back – no hassle and no questions asked. Our refund policy is valid for 10 days from the date of your purchase and applies to all course purchases. To request a refund, simply contact us and we will process your refund within 24 hours.

What else do I need to know?

  • This is an online course - classroom training is not included.
  • You will only receive a qualification – from the relevant vendor - once you have passed the official international certification exam(s).
  • For detailed information on specific exam requirements, prerequisites, costs and other information, please visit the respective certification vendor’s website (CompTIA, Microsoft, Cisco etc.).
  • International certification centres – Prometric, VUE, CertiPort and others - depending on the particular vendor and certification, administer the official exams.
  • The cost of exams are not included in the course fees.
  • This course does not include Live Labs. Live Labs are available as stand-alone programs and in our CertKit’s where courses and labs are combined as bundles.

Why get certified?

Get a Job

Certification holds significant benefits for organizations – increasing your chances to gain employment and securing a career towards success.

  • Teams are trained to consistent skills levels.
  • Certification provides a recognised benchmark of skills that can be aligned to organisational skills frameworks.
  • Certificated people are typically more productive and work to consistent standards. A recent survey by Novell found that certification can reduce downtime, because staff members have the skills needed to cope with issues as they arise - and that certified people made more use of a product's advanced features and could deploy new products with greater ease.
  • More reliable project completion: a Microsoft survey showed that when 60% of a team is Microsoft-certified, 80% of projects are delivered on time and within budget, compared to just 40% when only 25% of the team is certified.
  • Gaining certifications can be aligned to performance-related pay.
  • Certification ensures that knowledge has been retained.
  • Greater customer satisfaction (internal and external customers).
  • Lower staff turnover.

Get Recognized

A professional certification sets a person apart as someone who is exceptional, who really knows his/her job. Gaining a professional certification is not easy - but then again, it is not meant to be. Sixty four per cent of IT recruiters rate certifications as having extremely high or high value in validating the skills and expertise of job candidates. (CompTIA, Employer Perceptions of IT Training and Certification, January 2011). Some of the benefits to individuals include:

  • Certified people are more employable: according to an IDC white paper, "Sixty-three percent of hiring managers believe certified individuals are more productive than their non-certified counterparts."
  • You could earn more: a survey of MCPs by IDC found that 43% got a pay rise after gaining their certification.
  • Some certifications make you part of a professional network, for example, Microsoft Certified Professionals belong to a community that only they can access.

Get Ahead

Professional certifications (whether IT or not) have been with us more than two decades - and, during that time, there has been considerable research undertaken to assess the benefits of certification.

Key findings from 'Measuring the pulse of the IT industry' - research undertaken by CompTIA:

  • 56% of managers consider CompTIA certification to be an important factor when hiring people and 34% go as far as to require it.
  • 53% of managers would offer a higher salary to a job candidate with CompTIA certification.
  • 74% of managers say that CompTIA certification is an important factor in considering a person for promotion.
  • 78% of managers believe that CompTIA certification is an important step in validating an employee's skills.
  • 53% of managers feel that having CompTIA-certified employees makes the organisation more attractive to business partners and clients.
  • A help desk with certified professionals can handle 11% more phone calls and 28% more field service calls, with a lower staff turnover rate (16% versus 24%).
  • Fewer certified staff are required to manage a network, resulting in lower salary costs.

Key findings from 'Financial Benefits to Supporters of Microsoft Professional Certification', a report by market research company IDC:

  • Companies with Microsoft Certified Professionals experienced shorter server downtimes and greater productivity in the help-desk function, which more than paid for the direct and indirect costs associated with certification.
  • The cost of certification in an average organisation is recouped in about four months. Its supporting survey showed that Microsoft Certified Professionals are more productive than non-certified support staff.

Key findings from an IDC study, 'Benefits and Productivity Gains Realised through IT Certification':

  • Certified professionals handled 40% more support calls per person, per day, than non-certified staff.
  • Companies that advocated for certification reported 49% less downtime than companies that did not.
  • For the majority of companies, the savings from increased effectiveness paid the costs of certification in fewer than 9 months.

Add New Discussion