CompTIA PenTest+: Social Engineering & Specialized System Attacks

Intermediate
  • 11 videos | 56m 3s
  • Includes Assessment
  • Earns a Badge
Familiarize yourself with various aspects of social engineering exploits and attacks, as well as specialized system attacks. This course can be used to prepare for the PT0-001: CompTIA PenTest+ certification exam. Begin by learning about weaknesses in specialized systems, such as SCADA, which is used to remotely monitor and control unmanned critical infrastructure, such as parts of the electrical grid. Next, learn how to address phishing attacks, elicitation exploits, interrogation techniques, impersonation, hoaxing, shoulder surfing, USB key dropping, and motivation techniques. Finally, explore how to choose the best software for a pentesting lab, and how to configure a pentesting lab environment.

WHAT YOU WILL LEARN

  • Describe weaknesses in specialized systems
    Compare phishing attacks
    Specify elicitation exploits
    Define interrogation techniques
    Compare impersonation and hoaxing
    Describe shoulder surfing
  • Describe usb key dropping
    Realize motivation techniques
    Choose the best software for a pentesting lab
    Configure a pentesting lab environment
    Describe social attacks and exploits

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.