[UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam...
- Category Other
- Type Tutorials
- Language English
- Total size 8.2 GB
- Uploaded By SunRiseZone
- Downloads 2264
- Last checked 1 week ago
- Date uploaded 6 years ago
- Seeders 7
- Leechers 26
Infohash : 887476FEA88D4C4742B9F188EF827C4F09DE2C3C
Pass the CompTIA Pentest+ (PT0-001) exam on your 1st attempt, includes a Pentest+ practice exam!
Created by : Jason Dion • 60,000+ Students Worldwide, Dion Training Solutions • ATO for ITIL & PRINCE2
Last updated : 11/2018
Language : English
Subtitle : Included
Torrent Contains : 198 Files, 7 Folders
Course Source : https://www.udemy.com/pentestplus/
What you'll learn
• Take and pass the CompTIA Pentest+ (PT0-001) certification exam
• Understand the penetration testing methodology
• Understand how to plan and scope a penetration test
• Understand how to conduct information gathering and enumeration
• Understand how to exploit networks and systems during a pentest
• Understand how to prepare a report and communicate your findings
Requirements
• Basic understanding of network and network security
• Understand the concepts covered by the Network+ and Security+ exams
Description
** Taught by a Best Selling Certification Instructor **
This course provides everything you need in order to study for the CompTIA Pentest+ exam, including downloadable PDFs of every lecture to follow along with as you progress through the videos and to review before test day!
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Pentest+ exam or to better prepare yourself to serve on your organization's cyber defense team or as an independent penetration tester.
The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment, understand the legal/compliance requirements, perform vulnerability scanning/penetration test, and analyze/report on your findings. This certification was released on July 31, 2018 by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA Pentest+ exam is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course).
This course is designed for penetration testers, IT Security analysts, vulnerability analysts and testers, network security operations personnel, or anyone who is trying to get a better understanding of the concepts involved in conducting a penetration test and its associated toolsets.
The CompTIA Pentest+ (PT0-001) exam covers FIVE domains :
1. 15%: Planning and Scoping
2. 22%: Information Gathering and Vulnerability Identification
3. 30%: Attacks and Exploits
4. 17%: Penetration Testing Tools
5. 16%: Reporting and Communication
Each video lecture comes with a downloadable PDF of all the lecture notes for your offline study needs
Who this course is for :
• Students preparing for the CompTIA Pentest+ (PT0-001) Certification Exam
• Security Analysts
• Penetration Testers
• Vulnerability Testers
• Network Security Operations
• Application Security Vulnerability Testers.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/

Files:
[FreeTutorials.Eu] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU] 01 Introduction- 001 CompTIA-Pentest-Study-Notes.pdf (2.2 MB)
- 001 Welcome to the course-en.srt (7.8 KB)
- 001 Welcome to the course.mp4 (75.0 MB)
- 002 Exam Foundations-en.srt (8.3 KB)
- 002 Exam Foundations.mp4 (87.6 MB)
- 003 An Important Message About the Course-en.srt (2.5 KB)
- 003 An Important Message About the Course.mp4 (20.2 MB)
- 004 How to Schedule Your Exam-en.srt (7.1 KB)
- 004 How to Schedule Your Exam.mp4 (70.5 MB)
- 005 Planning and Scoping (Overview)-en.srt (2.6 KB)
- 005 Planning and Scoping (Overview).mp4 (26.2 MB)
- 006 Penetration Testing Methodology-en.srt (5.5 KB)
- 006 Penetration Testing Methodology.mp4 (60.6 MB)
- 007 Planning a Penetration Test-en.srt (16.2 KB)
- 007 Planning a Penetration Test.mp4 (152.9 MB)
- 008 Rules of Engagement-en.srt (12.5 KB)
- 008 Rules of Engagement.mp4 (107.7 MB)
- 009 Legal Concepts-en.srt (21.5 KB)
- 009 Legal Concepts.mp4 (195.0 MB)
- 010 Testing Strategies-en.srt (5.7 KB)
- 010 Testing Strategies.mp4 (54.9 MB)
- 011 White Box Support Resources-en.srt (11.8 KB)
- 011 White Box Support Resources.mp4 (119.2 MB)
- 012 Types of Assessments-en.srt (12.0 KB)
- 012 Types of Assessments.mp4 (106.2 MB)
- 013 Threat Actors-en.srt (15.0 KB)
- 013 Threat Actors.mp4 (140.2 MB)
- 014 Target Selection-en.srt (10.9 KB)
- 014 Target Selection.mp4 (101.8 MB)
- 015 Other Scoping Considerations-en.srt (15.8 KB)
- 015 Other Scoping Considerations.mp4 (129.1 MB)
- 016 Information Gathering and Vulnerability Identification (Overview)-en.srt (5.3 KB)
- 016 Information Gathering and Vulnerability Identification (Overview).mp4 (48.4 MB)
- 017 Information Gathering-en.srt (23.7 KB)
- 017 Information Gathering.mp4 (189.1 MB)
- 018 Reconnaissance with CentralOps (Demo)-en.srt (26.3 KB)
- 018 Reconnaissance with CentralOps (Demo).mp4 (120.5 MB)
- 019 Scanning and Enumeration-en.srt (8.4 KB)
- 019 Scanning and Enumeration.mp4 (84.2 MB)
- 020 Fingerprinting-en.srt (8.1 KB)
- 020 Fingerprinting.mp4 (78.7 MB)
- 021 Scanning and Enumeration (Demo)-en.srt (30.1 KB)
- 021 Scanning and Enumeration (Demo).mp4 (177.9 MB)
- 022 Cryptographic Inspection-en.srt (2.9 KB)
- 022 Cryptographic Inspection.mp4 (28.3 MB)
- 023 Eavesdropping-en.srt (7.2 KB)
- 023 Eavesdropping.mp4 (62.4 MB)
- 024 Decompiling and Debugging-en.srt (5.7 KB)
- 024 Decompiling and Debugging.mp4 (50.8 MB)
- 025 Open Source Research-en.srt (11.9 KB)
- 025 Open Source Research.mp4 (115.4 MB)
- 026 Vulnerability Scanning-en.srt (18.4 KB)
- 026 Vulnerability Scanning.mp4 (169.0 MB)
- 027 Scanning Considerations-en.srt (11.8 KB)
- 027 Scanning Considerations.mp4 (104.5 MB)
- 028 Application and Container Scans-en.srt (5.8 KB)
- 028 Application and Container Scans.mp4 (54.8 MB)
- 029 Analyzing Vulnerability Scans-en.srt (15.2 KB)
- 029 Analyzing Vulnerability Scans.mp4 (136.7 MB)
- 030 Leverage Information for Exploit-en.srt (6.8 KB)
- 030 Leverage Information for Exploit.mp4 (63.7 MB)
- 031 Common Attack Vectors-en.srt (13.1 KB)
- 031 Common Attack Vectors.mp4 (122.0 MB)
- 032 Weaknesses in Specialized Systems-en.srt (22.2 KB)
- 032 Weaknesses in Specialized Systems.mp4 (202.5 MB)
- 033 Attacks and Exploits (Overview)-en.srt (4.1 KB)
- 033 Attacks and Exploits (Overview).mp4 (36.6 MB)
- 034 Social Engineering-en.srt (27.2 KB)
- 034 Social Engineering.mp4 (237.9 MB)
- 035 Motivation Factors-en.srt (16.0 KB)
- 035 Motivation Factors.mp4 (138.5 MB)
- 036 Physical Security Attacks-en.srt (12.5 KB)
- 036 Physical Security Attacks.mp4 (104.9 MB)
- 037 Lock Picking (Demo)-en.srt (2.9 KB)
- 037 Lock Picking (Demo).mp4 (26.8 MB)
- 038 Network-based Vulnerabilities-en.srt (30.1 KB)
- 038 Network-based Vulnerabilities.mp4 (255.2 MB)
- 039 Wireless-based Vulnerabilities-en.srt (18.4 KB)
- 039 Wireless-based Vulnerabilities.mp4 (160.2 MB)
- 040 Wireless Network Attack (Demo)-en.srt (10.6 KB)
- 040 Wireless Network Attack (Demo).mp4 (77.3 MB)
- 041 Application-based Vulnerabilities-en.srt (39.4 KB)
- 041 Application-based Vulnerabilities.mp4 (324.4 MB)
- 042 Local Host Vulnerabilities-en.srt (6.1 KB)
- 042 Local Host Vulnerabilities.mp4 (53.0 MB)
- 043 Privilege Escalation (Linux)-en.srt (9.1 KB)
- 043 Privilege Escalation (Linux).mp4 (86.1 MB)
- 044 Privilege Escalation (Windows)-en.srt (20.6 KB)
- 044 Privilege Escalation (Windows).mp4 (192.7 MB)
- 045 Privilege Escalation-en.srt (10.8 KB)
- 045 Privilege Escalation.mp4 (93.8 MB)
- 046 Privilege Escalation (Demo)-en.srt (9.3 KB)
- 046 Privilege Escalation (Demo).mp4 (90.9 MB)
- 047 Lateral Movement-en.srt (16.8 KB)
- 047 Lateral Movement.mp4 (163.7 MB)
- 048 Persistence-en.srt (13.2 KB)
- 048 Persistence.mp4 (125.0 MB)
- 049 Covering Your Tracks-en.srt (11.6 KB)
- 049 Covering Your Tracks.mp4 (101.6 MB)
- 050 Persistence and Covering Tracks (Demo)-en.srt (14.9 KB)
- 050 Persistence and Covering Tracks (Demo).mp4 (107.8 MB)
- 051 Penetration Testing Tools (Overview)-en.srt (6.4 KB)
- 051 Penetration Testing Tools (Overview).mp4 (47.6 MB)
- 052 Nmap Usage-en.srt (20.2 KB)
- 052 Nmap Usage.mp4 (194.8 MB)
- 053 Nmap Usage (Demo)-en.srt (20.5 KB)
- 053 Nmap Usage (Demo).mp4 (96.1 MB)
- 054 Use Cases for Tools-en.srt (13.5 KB)
- 054 Use Cases for Tools.mp4 (137.9 MB)
- 055 Scanners-en.srt (3.9 KB)
- 055 Scanners.mp4 (41.0 MB)
- 056 Credential Testing Tools-en.srt (12.9 KB)
- 056 Credential Testing Tools.mp4 (121.2 MB)
- 057 Password Cracking (Demo)-en.srt (4.1 KB)
- 057 Password Cracking (Demo).mp4 (26.2 MB)
- 058 Debuggers-en.srt (5.1 KB)
- 058 Debuggers.mp4 (47.0 MB)
- 059 Software Assurance-en.srt (4.2 KB)
- 059 Software Assurance.mp4 (42.0 MB)
- 060 OSINT-en.srt (9.7 KB)
- 060 OSINT.mp4 (93.2 MB)
- 061 Wireless-en.srt (3.6 KB)
- 061 Wireless.mp4 (33.8 MB)
- 062 Web Proxies-en.srt (17.1 KB)
- 062 Web Proxies.mp4 (105.9 MB)
- 063 Social Engineering Tools-en.srt (2.6 KB)
- 063 Social Engineering Tools.mp4 (23.0 MB)
- 064 Remote Access Tools-en.srt (14.0 KB)
- 064 Remote Access Tools.mp4 (93.9 MB)
- 065 Networking Tools-en.srt (3.3 KB)
- 065 Networking Tools.mp4 (31.2 MB)
- 066 Mobile Tools-en.srt (4.1 KB)
- 066 Mobile Tools.mp4 (41.3 MB)
- 067 Miscellaneous Tools-en.srt (9.3 KB)
- 067 Miscellaneous Tools.mp4 (85.7 MB)
- 068 Intro to Programming-en.srt (6.5 KB)
- 068 Intro to Programming.mp4 (52.3 MB)
- 069 Programming Concepts-en.srt (43.7 KB)
- 069 Programming Concepts.mp4 (405.7 MB)
- 070 Bash-Example-Scan-with-Nmap.txt (2.8 KB)
- 070 BASH Script Example-en.srt (8.2 KB)
- 070 BASH Script Example.mp4 (79.6 MB)
- 071 Python-Example-Public-IP.txt (2.4 KB)
- 071 Python Script Example-en.srt (7.8 KB)
- 071 Python Script Example.mp4 (61.0 MB)
- 072 PowerShell-Example-Enumerator.txt (8.7 KB)
- 072 PowerShell Script Example-en.srt (6.8 KB)
- 072 PowerShell Script Example.mp4 (56.7 MB)
- 073 MS17-010-Exploit-700-lines-of-Ruby.txt (25.8 KB)
- 073 Ruby-Example-Banner-Grabber.txt (0.8 KB)
- 073 Ruby Script Example-en.srt (8.6 KB)
- 073 Ruby Script Example.mp4 (81.3 MB)
- 074 Reporting and Communication (Overview)-en.srt (4.0 KB)
- 074 Reporting and Communication (Overview).mp4 (36.3 MB)
- 075 Pentest Communications-en.srt (19.9 KB)
- 075 Pentest Communications.mp4 (164.7 MB)
- 076 Report Writing-en.srt (18.1 KB)
- 076 Report Writing.mp4 (150.9 MB)
- 077 Mitigation Strategies-en.srt (15.9 KB)
- 077 Mitigation Strategies.mp4 (133.0 MB)
- 078 Post-Report Activities-en.srt (9.7 KB)
- 078 Post-Report Activities.mp4 (85.6 MB)
- 079 An-excellent-example-of-a-Penetration-Testing-report-external-link-to-SANS.org-website-.txt (0.5 KB)
- 079 Pentest Report Example-en.srt (1.8 KB)
- 079 Pentest Report Example.mp4 (16.6 MB)
- 080 Conclusion-en.srt (3.6 KB)
- 080 Conclusion.mp4 (38.3 MB)
- 081 Click-here-to-download-the-Kali-Linux-virtual-machine.txt (0.4 KB)
- 081 Click-here-to-download-the-Metasploitable2-virtual-machine.txt (0.4 KB)
- 081 Creating Your Pentest Lab-en.srt (18.9 KB)
- 081 Creating Your Pentest Lab.mp4 (154.5 MB)
- 082 Anatomy-of-a-Cyber-Attack-Beginner-Hacking-with-Metasploit.txt (0.3 KB)
- 082 BONUS Congratulations on Completing the Course-en.srt (1.6 KB)
- 082 BONUS Congratulations on Completing the Course.mp4 (16.7 MB)
- 082 CompTIA-CySA-CS0-001-5-Practice-Certification-Exams.txt (0.3 KB)
- 082 CompTIA-CySA-CS0-001-Complete-Course-and-Practice-Exam.txt (0.3 KB)
- 082 CompTIA-Network-Cert-N10-007-Full-Course-Practice-Exam.txt (0.3 KB)
- 082 CompTIA-Network-N10-007-5-Practice-Exams-Simulations.txt (0.3 KB)
- 082 CompTIA-Pentest-PT0-001-Complete-Course-Practice-Exam.txt (0.3 KB)
- 082 How-to-Pass-Certification-Exams-with-Strategic-Test-Taking-.txt (0.3 KB)
- 082 Introduction-to-Cloud-Security-with-Microsoft-Azure.txt (0.3 KB)
- 082 Introduction-to-Malware-Analysis-for-Incident-Responders.txt (0.3 KB)
- 082 ITIL-Foundation-Complete-ITIL-Exam-Preparation-Course.txt (0.3 KB)
- 082 ITIL-Foundation-Cram-to-Pass-the-ITIL-Exam-in-7-Days-.txt (0.3 KB)
- 082 ITIL-Foundation-Practice-Certification-Exams-6-Exams-.txt (0.3 KB)
- 082 PRINCE2-Agile-Foundation-Get-certified-in-the-next-7-days-.txt (0.3 KB)
- 082 PRINCE2-Foundation-Cram-to-Pass-the-PRINCE2-Exam-in-7-Days-.txt (0.3 KB)
- 082 PRINCE2-Foundation-Practice-Certification-Exams-6-Exams-.txt (0.3 KB)
- 082 Risk-Management-for-Cybersecurity-and-IT-Managers.txt (0.4 KB)
- 082 Udemy-Coupon-Codes-Graduate.pdf (2.7 MB)
- 082 -UNOFFICIAL-Certified-Ethical-Hacker-CEH-Practice-Exams.txt (0.3 KB)
- 082 WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners.txt (0.3 KB)
- Discuss.FreeTutorials.Us.html (165.7 KB)
- FreeCoursesOnline.Me.html (108.3 KB)
- FreeTutorials.Eu.html (102.2 KB)
- How you can help Team-FTU.txt (0.3 KB)
- [TGx]Downloaded from torrentgalaxy.org.txt (0.5 KB)
- Torrent Downloaded From GloDls.to.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- https://tracker.fastdownload.xyz:443/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://open.stealth.si:80/announce
- udp://hk1.opentracker.ga:6969/announce
- udp://tracker.cyberia.is:6969/announce
- https://opentracker.xyz:443/announce
- https://t.quic.ws:443/announce
- udp://9.rarbg.to:2710/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://bt.xxx-tracker.com:2710/announce
- udp://open.demonii.si:1337/announce