CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
4.5 (1,850 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
10,709 students enrolled

CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam

Pass the CompTIA Pentest+ (PT0-001) exam on your 1st attempt, includes a Pentest+ practice exam!
Bestseller
4.5 (1,850 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
10,709 students enrolled
Last updated 1/2020
English
English, French [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • 1 article
  • 6 downloadable resources
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Take and pass the CompTIA Pentest+ (PT0-001) certification exam
  • Understand the penetration testing methodology
  • Understand how to plan and scope a penetration test
  • Understand how to conduct information gathering and enumeration
  • Understand how to exploit networks and systems during a pentest
  • Understand how to prepare a report and communicate your findings
Requirements
  • Basic understanding of network and network security
  • Understand the concepts covered by the Network+ and Security+ exams
Description

** Taught by a Best Selling Certification Instructor **

This course provides everything you need in order to study for the CompTIA Pentest+ (PT0-001) exam, including a downloadable PDF study guide to follow along with as you progress through the videos and to review before test day!

Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Pentest+ (PT0-001) exam or to better prepare yourself to serve on your organization's cyber defense team or as an independent penetration tester.

The CompTIA Pentest+ (PT0-001) certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment, understand the legal/compliance requirements, perform vulnerability scanning/penetration tests, and analyze/report on your findings.  This certification was released on July 31, 2018 by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA Pentest+ (PT0-001) exam is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course). 

This course is designed for penetration testers, IT Security analysts, vulnerability analysts and testers, network security operations personnel, or anyone who is trying to get a better understanding of the concepts involved in conducting a penetration test and its associated toolsets.

The CompTIA Pentest+ (PT0-001) exam covers FIVE domains:

  1. 15%: Planning and Scoping

  2. 22%: Information Gathering and Vulnerability Identification

  3. 30%: Attacks and Exploits

  4. 17%: Penetration Testing Tools

  5. 16%: Reporting and Communication

** Each video lecture comes with a downloadable PDF of all the lecture notes for your offline study needs **

What Other Students Are Saying About My Pentest+ (Ethical Hacking) Course here on Udemy:

  • I've taken several of Jason's courses and they all have been outstanding. This one is no exception. He provides a clear and concise review of each of the areas covered by the Pentest+ exam. If you have the requisite experience, this course will provide a great refresher for key points as you prepare to sit for the examination. (Steven, 5 stars)

  • I chose this course because i have recently finished the security+ course and really love the style of the instructor. I have no doubt this course will help and be a great addition to my comptia pentest+ study guide and hands on testing. (Rachel, 5 stars)

  • Jason Dion is both well-versed in the material as well as a solid teacher. I also took his CySA+ course last year and found it to be excellent. This PenTest+ course is more of the same quality content! (Chris, 5 stars)

  • Really enjoying this course. This is by far the best course to date. (Simon, 5 stars)

Who this course is for:
  • Students preparing for the CompTIA Pentest+ (PT0-001) Certification Exam
  • Security Analysts
  • Penetration Testers
  • Vulnerability Testers
  • Network Security Operations
  • Application Security Vulnerability Testers
Course content
Expand all 81 lectures 08:05:08
+ Introduction
3 lectures 09:08

A short welcome and introduction to the course, as well as important information on how to use the video player and download the additional resources in this course.

Preview 04:17

This lesson includes the downloadable study guide as a resource for your offline studies and note-taking.

Download the Study Guide
00:07

This video presents students with a quick overview of the CompTIA Pentest+ (PT0-001) exam.

Preview 04:44
+ Domain 1: Planning and Scoping
11 lectures 01:04:46

This video presents students with a quick overview of Domain 1 (Planning and Scoping). 

Preview 01:27

This video presents students with the various penetration testing methodologies used in this course.

Preview 03:02

This video discusses how to plan a penetration test.

Planning a Penetration Test
08:07

This video discusses the Rules of Engagement for a penetration test.

Rules of Engagement
05:39

This lesson covers the legalities of performing a penetration test, such as written authorization, hacking crimes, and contractual obligations.

Legal Concepts
11:00

This lesson covers Black Box, Gray Box, and White Box tests.

Testing Strategies
03:04

This video discusses the various types of support resources that a white box tester may expect to receive from an organization.

White Box Support Resources
06:34

This lesson covers the different types of penetration tests that can be performed.

Types of Assessments
05:47

This lesson covers the different types of threat actors that hack our networks.

Threat Actors
07:41

This lesson covers the different considerations used in target selections.

Target Selection
05:15

This lesson covers some additional scoping considerations.

Other Scoping Considerations
07:10
Domain 1 Quiz
10 questions
+ Domain 2: Information Gathering and Vulnerability Identification
17 lectures 01:49:59

This lesson provides an overview of Domain 2: Information Gathering and Vulnerability Identification.

Information Gathering and Vulnerability Identification (Overview)
02:40

This lesson covers the concepts of information gathering.

Information Gathering
10:11

In this demonstration, you will learn how open source reconnaissance is performed to gather information about a target using openly available information and scanning techniques with CentralOps.net.

Reconnaissance with CentralOps (Demo)
13:18

This lesson covers the concepts of scanning and enumeration during a penetration test.

Scanning and Enumeration
04:30

This lesson covers the concepts of fingerprinting systems and networks.

Fingerprinting
04:19

In this demonstration, you will learn how a simple tool like Zenmap (the GUI for Nmap) can be used to perform scanning and enumeration of a network.

Preview 15:59

This lesson covers the concepts of cryptographic inspections.

Cryptographic Inspection
01:32

This lesson covers the concepts of eavesdropping during a penetration test.

Eavesdropping
03:24

This lesson covers the concepts of decompiling and debugging.

Decompiling and Debugging
02:52

This lesson covers the concepts of utilizing open source research to match vulnerabilities to exploits.

Open Source Research
06:17

This lesson covers the concepts of vulnerability scanning and its tools.

Vulnerability Scanning
08:51

This lesson covers the different considerations that should be thought of during vulnerability scanning.

Scanning Considerations
05:40

This lesson covers the concepts of scanning both applications and containers.

Application and Container Scans
02:56

This lesson covers the concepts of how to analyze a vulnerability scans results.

Analyzing Vulnerability Scans
07:11

This lesson covers the concepts of how to leverage information exploits.

Leverage Information for Exploit
03:22

This lesson covers the different types of attack vectors that a pentester can use.

Common Attack Vectors
06:26

This lesson covers the different types of specialized systems a pentester might come across during an assessment.

Weaknesses in Specialized Systems
10:31
Domain 2 Quiz
10 questions
+ Domain 3: Attacks and Exploits
18 lectures 02:13:41

This lesson provides an overview of Domain 3: Attacks and Exploits.

Attacks and Exploits (Overview)
02:00

This lesson covers the different types of social engineering that a pentester might utilize during an assessment.

Social Engineering
12:18

This lesson covers the different types of motivation factors used in social engineering that a  pentester might utilize during an assessment.

Motivation Factors
07:15

This lesson covers the different types of physical security attacks that a pentester might utilize during an assessment.

Physical Security Attacks
05:30

In this demo, you will see how easy it is to use a lock pick to bypass the physical security that a traditional lock provides.

Lock Picking (Demo)
01:28

This lesson covers the different types of network-based attacks that a pentester might utilize during an assessment.

Network-based Vulnerabilities
13:47

This lesson covers the different types of wireless-based attacks that a pentester might utilize during an assessment., including attacks against WiFi, Radio Frequency, Cellular, and Bluetooth.

Wireless-based Vulnerabilities
08:48

In this demonstration, you will see how easy it is to conduct a wireless network attack through capturing a handshake and using a dictionary attack to crack the password.

Wireless Network Attack (Demo)
05:52

This lesson covers the different types of application-based vulnerabilities, such as injections, authentication, authorization, XSS, CSRF/CSRF, clickjacking, security misconfigurations, file inclusions, and unsecure coding practices.

Application-based Vulnerabilities
18:54

This lesson covers the different types of local host vulnerabilities, like missing patches and misconfigurations.

Local Host Vulnerabilities
03:01

This lesson covers the different types of privilege escalation to use against Linux systems.

Privilege Escalation (Linux)
04:51

This lesson covers the different types of privilege escalation to use against Windows systems.

Privilege Escalation (Windows)
10:43

This lesson covers the different types of privilege escalation to use against both Linux and Windows systems.

Privilege Escalation
05:10

In this demonstration, you will see how a privilege escalation attack is performed against a Windows host using the Metasploit Framework.

Privilege Escalation (Demo)
04:31

This lesson covers the different types of technologies used by attackers to conduct lateral movement.

Lateral Movement
09:11

This lesson covers the different types of technologies used by attackers for maintaining persistence.

Persistence
06:50

This lesson covers the different types of methods used by attackers to cover their tracks during an attack.

Covering Your Tracks
05:40

In this demonstration, you will learn how an attacker can use AT to schedule tasks and the Alternate Data Streams to hide malicious software and files in Windows environments.

Persistence and Covering Tracks (Demo)
07:52
Domain 3 Quiz
10 questions
+ Domain 4: Penetration Testing Tools
23 lectures 02:01:54

This lesson provides a quick overview of Domain 4 and what you should focus on during this section of the course.

Penetration Testing Tools (Overview)
02:48

This lesson provides you with the necessary Nmap commands you should be familiar with for this course and the exam.

Nmap Usage
10:16

A hands-on demo of using Nmap for scanning a network and discovering hosts/servers on a network. 

Nmap Usage (Demo)
11:54

This lesson provides an overview of the different use cases for various tools.

Use Cases for Tools
07:28

This lessons provides the details of each tool classified as a Scanner on the Pentest+ exam.

Scanners
02:07

This lessons provides the details of each tool classified as a Credential Testing Tool on the Pentest+ exam.

Credential Testing Tools
06:44

In this demo, you will learn how easy it is to use password cracking tools like John the Ripper.

Password Cracking (Demo)
02:19

This lessons provides the details of each tool classified as a Debuggers on the Pentest+ exam.

Debuggers
02:41

This lessons provides the details of each tool classified as a Software Assurance on the Pentest+ exam.

Software Assurance
02:13

This lessons provides the details of each tool classified as a OSINT on the Pentest+ exam.

OSINT
04:49

This lessons provides the details of each tool classified as a Wireless on the Pentest+ exam.

Wireless
01:48

This lessons provides the details of each tool classified as a WEb Proxy on the Pentest+ exam. In this lesson, you will also see a hands-on demonstration of using a web proxy and conducting an SQL attack.

Web Proxies
08:58

This lessons provides the details of each tool classified as a Social Engineering Tool on the Pentest+ exam.

Social Engineering Tools
01:17

This lessons provides the details of each tool classified as a Remote Access Tool on the Pentest+ exam.

Remote Access Tools
07:24

This lessons provides the details of each tool classified as a Networking tool on the Pentest+ exam.

Networking Tools
01:34

This lessons provides the details of each tool classified as a Mobile Tool on the Pentest+ exam.

Mobile Tools
02:05

This lessons provides the details of each tool classified as a Miscellaneous Tool on the Pentest+ exam.

Miscellaneous Tools
04:28

In this lecture, we introduce the programming section of the exam.

Intro to Programming
02:57

In this lecture, we introduce the concepts of programming.

Programming Concepts
21:51

In this lesson, I will walk you step by step through analyzing a BASH script.

BASH Script Example
04:33

In this lesson, I will walk you step by step through analyzing a Python script.

Python Script Example
03:45

In this lesson, I will walk you step by step through analyzing a PowerShell script.

PowerShell Script Example
03:27

In this lesson, I will walk you step by step through analyzing a Ruby script.

Ruby Script Example
04:28
Domain 4 Quiz
10 questions
+ Domain 5: Reporting and Communication
6 lectures 31:06

This lessons provides an overview of the reporting and communication objectives on the Pentest+ exam.

Reporting and Communication (Overview)
01:54

This lessons provides coverage of the pentest communication objective on the Pentest+ exam.

Pentest Communications
08:41

This lessons provides coverage of the report writing objective on the Pentest+ exam., including a listing of the sections needed in the report.

Report Writing
07:58

This lessons provides coverage of the findings and remediations objective on the Pentest+ exam.

Mitigation Strategies
07:27

This lessons provides coverage of the post-report activities objective on the Pentest+ exam, including removal of tools/shells, attestation of findings, and more. 

Post-Report Activities
04:20

This lesson will provide you with a sample Penetration Testing and a great explanation of every piece of the report.

Pentest Report Example
00:46
Domain 5 Quiz
10 questions
+ Conclusion
3 lectures 14:34

A short conclusion and summary of the course.

Conclusion
01:58

In this lab, you will create your first Penetration Testing lab!

Creating Your Pentest Lab
09:08

In this video, you will receive a special thank you message from Jason with tips on how to get the best price for ANY of our other courses on Udemy!

BONUS: Where to go from here?
03:28
+ PENTEST+ (PT0-001) Practice Exam
0 lectures 00:00

This exam provides students with a good example of what the exam will be like on test day. You should aim to score at least 90% or higher on this exam.

To aid in your learning, every question has a detailed explanation of why the right answer is correct.

Before sitting for the Pentest+ exam, you should take a few practice exams from various authors and test banks to ensure you are ready!

Pentest+ (PT0-001) Practice Exam
70 questions