CompTIA PenTest+: Discovering & Analyzing Vulnerabilities

CompTIA PenTest+    |    Intermediate
  • 13 videos | 1h 9m 15s
  • Earns a Badge
Penetration testing (pen testing) involves simulating real-world cyberattacks on a computer system, network, or application to identify security vulnerabilities that could be exploited by malicious actors. The discovery and analysis of vulnerabilities are critical steps in this process. In this course, explore how to conduct vulnerability discovery using various techniques, including container, application, and network scanning. Next, learn about common vulnerability discovery tools and how to conduct vulnerability discovery on industrial control systems (ICS). Finally, discover how to analyze output from reconnaissance, scanning, and enumeration phases, as well as common security concepts including tailgating, site surveys, universal serial bus (USB) drops, badge cloning, and lock picking. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiation between vulnerability scans, including container, application, and network scans
    Identify manual assessments and port mirroring techniques for dealing with industrial control systems (ics)
    Outline vulnerability discovery and analysis tools, including nikto, trufflehog, grype, and kube-hunter
    Recognize how to validate scan, reconnaissance, and enumeration results
    Describe how to analyze public exploits
    Use scripting to validate vulnerability discovery and analysis results
  • Identify the key concepts of tailgating attacks
    Describe how site surveys can lead to security vulnerabilities
    Recognize the dangers of universal serial bus (usb) drops
    Outline the key concepts of security badge cloning threats
    Identify the threats posed by security lock pickings
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 18s
    After completing this video, you will be able to differentiation between vulnerability scans, including container, application, and network scans. FREE ACCESS
  • Locked
    3.  Industry Control System (ICS) Assessments
    6m 47s
    Upon completion of this video, you will be able to identify manual assessments and port mirroring techniques for dealing with industrial control systems (ICS). FREE ACCESS
  • Locked
    4.  Vulnerability Discovery and Analysis Tools
    6m 27s
    In this video, we will outline vulnerability discovery and analysis tools, including Nikto, TruffleHog, Grype, and kube-hunter. FREE ACCESS
  • Locked
    5.  Analysis Results and Validation
    5m 59s
    Through this video, you will be able to recognize how to validate scan, reconnaissance, and enumeration results. FREE ACCESS
  • Locked
    6.  Public Exploit Selection
    6m 16s
    After completing this video, you will be able to describe how to analyze public exploits. FREE ACCESS
  • Locked
    7.  Using Scripting to Validate Output Results
    6m 41s
    During this video, discover how to use scripting to validate vulnerability discovery and analysis results. FREE ACCESS
  • Locked
    8.  Tailgating Attacks
    5m 32s
    Upon completion of this video, you will be able to identify the key concepts of tailgating attacks. FREE ACCESS
  • Locked
    9.  Site Surveys
    6m 17s
    In this video, we will describe how site surveys can lead to security vulnerabilities. FREE ACCESS
  • Locked
    10.  Universal Serial Bus (USB) Drop Attacks
    5m 41s
    Through this video, you will be able to recognize the dangers of universal serial bus (USB) drops. FREE ACCESS
  • Locked
    11.  Security Badge Cloning
    5m 36s
    After completing this video, you will be able to outline the key concepts of security badge cloning threats. FREE ACCESS
  • Locked
    12.  Security Lock Picking
    5m 37s
    Upon completion of this video, you will be able to identify the threats posed by security lock pickings. FREE ACCESS
  • Locked
    13.  Course Summary
    46s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)