CompTIA PenTest+ PT0-001 Cert Guide

Learn the skills of penetration testing for passing the CompTIA PenTest+ PT0-001 exam with uCertify CompTIA PenTest+ PT0-001 course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The PenTest+ course covers all the objectives of the CompTIA PenTest+ PT0-001 exam. It helps you to learn the concepts and topics of penetration testing such as planning and scoping a penetration testing assessment, exploiting wired and wireless networks, exploiting application-based vulnerabilities, performing post-exploitation techniques, understanding how to finalize a penetration test, and many more.

Here's what you will get

The CompTIA PenTest+ certification is an intermediate-level certification and validates the candidates' knowledge and skills required to plan and scope an assessment, comprehend legal and compliance requirements, execute penetration testing and vulnerability scanning, interpret data, and adequately report the results. The CompTIA PenTest+ PT0-001 exam evaluates the most updated penetration testing, vulnerability assessment, and management skills essential to determine the resiliency of the system against assaults. Candidates will have the essential skills required to modify assessment frameworks to efficiently collaborate on and report findings.

Lessons
Lessons
11+
Exercises
1+
Quizzes
211+
Flashcards
112+
Glossary of terms
112+
Test prep
Pre-assessment Questions
84+
Full Length Tests
2+
Post-Assessment Questions
85+
Lab
Performance lab
Learn the real world skills using Live Labs.
66+
Video tutorials
Get interactive learning videos with transcripts and voice-over.
66+
Hours
Signify the duration of video tutorials in labs.
01:06+
Exam FAQs
What are the prerequisites for this exam? Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
What is the exam registration fee? USD 349
Where do I take the exam? CompTIA
What is the format of the exam? Performance-based and multiple choice
How many questions are asked in the exam? The exam contains Maximum of 85 questions.
What is the duration of the exam? 165 minutes
What is the passing score? 750

(on a scale of 0-900)

What is the exam's retake policy?

In the event that you fail your first (1st) attempt to pass any CompTIA certification examination, CompTIA does not require any waiting period between the first (1st) and second (2nd) attempt to pass such examination. However, before your third (3rd) attempt or any subsequent attempt to pass such examination, you shall be required to wait for a period of at least fourteen (14) calendar days from the date of your last attempt to pass such examination.

  • CompTIA beta examinations may only be taken one (1) time by each candidate.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer any free re-tests or discounts on retakes.
  • If a Candidate has passed an exam (or multiple exams) and achieved a certification, he/she cannot take the exam again, using the same exam code, without prior consent from CompTIA.
  • A test found to be in violation of the retake policy will be invalidated and the candidate may be subject to a suspension period. Repeat violators will be permanently banned from participation in the CompTIA Certification Program.
What is the validity of the certification? TBD - Usually three years after launch.
Where can I find more information about this exam? To know more about the pearson-PT0-001-complete, click here.
What are the career opportunities after passing this exam?
  • Penetration Tester
  • Security Analyst (II)
  • Vulnerability Tester
  • Network Security Operations
  • Application Security Vulnerability
  • Vulnerability Assessment Analyst

Here's what you will learn

  • Understanding Ethical Hacking and Penetration Testing
  • Understanding the Current Threat Landscape
  • Exploring Penetration Testing Methodologies
  • Building Your Own Lab
  • Review All Key Topics
  • Explaining the Importance of the Planning and Preparation Phase
  • Understanding the Legal Concepts of Penetration Testing
  • Learning How to Scope a Penetration Testing Engagement Properly
  • Learning the Key Aspects of Compliance-Based Assessments
  • Review All Key Topics
  • Understanding Information Gathering and Reconnaissance
  • Understanding the Art of Performing Vulnerability Scans
  • Understanding How to Analyze Vulnerability Scan Results
  • Review All Key Topics
  • Understanding Social Engineering Attacks
  • Phishing
  • Pharming
  • Malvertising
  • Spear Phishing
  • SMS Phishing
  • Voice Phishing
  • Whaling
  • Elicitation, Interrogation, and Impersonation (Pretexting)
  • Social Engineering Motivation Techniques
  • Shoulder Surfing
  • USB Key Drop and Social Engineering
  • Review All Key Topics
  • Exploiting Network-Based Vulnerabilities
  • Exploiting Wireless and RF-Based Attacks and Vulnerabilities
  • Review All Key Topics
  • Overview of Web Applications for Security Professionals
  • How to Build Your Own Web Application Lab
  • Understanding Injection-Based Vulnerabilities
  • Exploiting Authentication-Based Vulnerabilities
  • Exploiting Authorization-Based Vulnerabilities
  • Understanding Cross-Site Scripting (XSS) Vulnerabilities
  • Understanding Cross-Site Request Forgery Attacks
  • Understanding Clickjacking
  • Exploiting Security Misconfigurations
  • Exploiting File Inclusion Vulnerabilities
  • Exploiting Insecure Code Practices
  • Review All Key Topics
  • Exploiting Local Host Vulnerabilities
  • Understanding Physical Security Attacks
  • Review All Key Topics
  • Maintaining Persistence After Compromising a System
  • Understanding How to Perform Lateral Movement
  • Understanding How to Cover Your Tracks and Clean Up Systems After a Penetration Testing Engagement
  • Review All Key Topics
  • Understanding the Different Use Cases of Penetration Testing Tools and How to Analyze Their Output
  • Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements
  • Review All Key Topics
  • Explaining Post-Engagement Activities
  • Surveying Report Writing Best Practices
  • Understanding Report Handling and Communications Best Practices
  • Review All Key Topics

Hands on Activities (Labs)

  • Examining Penetration Testing Execution Standard (PTES)
  • Examining Open Source Security Testing methodology Manual
  • Examining NIST SP 800-115 - Technical Guide to Information Security Testing and Assessment
  • Examining the OWASP Web Testing Methodologies and Testing Guide
  • Studying CVSS Exercises with the CVSS Calculator
  • Studying SOW, MSA and NDA, Rules of Engagegement, Scope, Scope Creep
  • Using DNSRecon
  • Using Nmap SYN Scan
  • Using Nmap UDP Scan  
  • Using Nmap FIN Scan
  • Using Nmap for Host Enumeration
  • Using Nmap for User Enumeration
  • Using Nmap for Group Enumeration
  • Using Nmap for Web Application Enumeration
  • Using Nmap for Network Enumeration
  • Performing Domain Enumeration
  • Using DNSdumpster
  • Using Recon-ng
  • Zone Transfer Using dig   
  • Using Automated Vulnerability Scanning
  • Exploit SMB
  • Exploiting SNMP
  • Exploiting SMTP
  • Understanding Pass-the-hash attack
  • Using searchsploit
  • ARP Spoofing
  • Performing Man-in-Middle Attack
  • DHCP Starvation Attack
  • Understanding MAC Bypass
  • Simulating DDoS Attack
  • Using the EternalBlue Exploit in Metasploit
  • Using Nmap to Perform recon
  • Exploiting SQL Injection Vulnerabilities
  • Exploiting Blind SQL Injection Vulnerabilities
  • Exploit PHP Object Injection
  • Exploiting Stored (persistent) XSS Attack
  • Exploiting DOM-Based XSS Attack
  • Exploiting Reflected XSS Attack
  • Exploiting Cross-site request forgery (CSRF or XSRF) attacks
  • Exploiting Command Injection Vulnerabilities
  • Understanding Credential based Bruteforce attack
  • Performing Session Hijacking
  • Exploiting Local File Inclusion Vulnerabilities
  • Exploiting Remote File Inclusion Vulnerabilities
  • Understanding SUI or SGID and Unix Program
  • Local Privilege Escalation
  • Exploting SAM Database
  • Using Apktool to decode and Analyze apk file
  • Creating Reverse and Bind Shells using Netcat
  • Using the Metasploit RDP Post-Exploitation Module
  • Using Nslookup for Passive Reconnaissance
  • Using Dig for Passive Reconnaissance
  • Using ExifTool
  • Using the Theharvester Tool to Gather Information about a victim
  • Using Nikto
  • Using Burp and the OWASP Zed Attack Proxy
  • Using meterpreter
  • Using Bash for Penetration Testing
  • Using Python for penetration testing
  • Using Powershell for Penetration Testing
  • Using Maltego
  • Using Zenmap
  • Using OpenVAS
  • Using the Dradis Framework CE on Kali Linux
  • Study the communication plan and how the main elements of a pen test report
pearson-PT0-001-complete_pro pearson-PT0-001-complete_pro
pearson-PT0-001-complete
CompTIA PenTest+ PT0-001 Cert Guide
ISBN : 9781644590522
Rating :
(16)