Integrated CertMaster Learn + Labs for CompTIA PenTest+ (PT0-002)
Integrated CertMaster Learn + Labs for CompTIA PenTest+ (PT0-002)
Take your penetration testing knowledge to the next level. We help you develop the skills to become an expert in penetration testing and vulnerability management.
What is CertMaster Learn integrated with CertMaster Labs?
CertMaster Learn is a comprehensive eLearning experience that helps learners gain the knowledge and practical skills necessary to be successful on CompTIA certification exams, and in their IT career. A Learning Plan helps learners stay on track with your studies, while robust analytics bring awareness of strengths and weaknesses.
CertMaster Labs make it easy for learners to practice and apply their skills in real workplace scenarios in preparation for the certification exam. All lab activities use real equipment and software, offer feedback and hints, and provide a score based on learner inputs, ultimately guiding learners to the most correct and efficient path through job tasks.
In the integrated experience, CertMaster Labs are integrated as Study Tasks within the CertMaster Learn Learning Plan, accessible through a single login and seamless workflow. Easy-to-use course management tools provide a comprehensive suite of instructor resources alongside a reporting dashboard, making course preparation and progress tracking simple and efficient.
Topics Covered
Lesson 1: Scoping Organization/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
Integrated Labs:
Assisted Lab: Exploring the Lab Environment
Assisted Lab: Gathering Intelligence
Assisted Lab: Performing Social Engineering using SET
Assisted Lab: Discovering Information using Nmap
Assisted Lab: Performing Vulnerability Scans and Analysis
Assisted Lab: Penetrating an Internal Network
Assisted Lab: Exploiting Web Authentication
Assisted Lab: Exploiting Weaknesses in a Website
Assisted Lab: Exploiting Weaknesses in a Database
Assisted Lab: Using SQL Injection
Assisted Lab: Performing an AitM Attack
Assisted Lab: Performing Password Attacks
Assisted Lab: Using Reverse and Bind Shells
Assisted Lab: Performing Post-Exploitation Activities
Assisted Lab: Establishing Persistence
Assisted Lab: Performing Lateral Movement