CompTIA PenTest+ Course

Course

Online

Save 50%

Special Emagister price

£ 195 £ 395 VAT inc.

Call the centre

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

"Course Description

CompTIA is a globally recognised provider of top quality IT certifications that help to train and identify knowledgeable IT professionals.

This highly hands-on CompTIA PenTest+ course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the CompTIA PT0-001 exam while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are mostly Kali Linux-based, covering a broad range of real-world examples used by penetration testers and red teams.

The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.

In this course you will learn hands-on penetration testing and hacking skills including:

Client engagement and documentation
Passive and active reconnaissance
Windows, Linux, and mobile device system hacking
Physical security testing and social engineering
Wired and wireless network hacking and exploitation
Network service hacking and exploitation
Application and web app hacking and exploitation
Lateral movement and persistence in a compromised network
Covering your tracks
Report writing and post-test clean up

Why is it different?
"

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

"Who Is This Course For?
This course is intended for advanced students and cybersecurity practitioners who will actively test networks and computer systems for vulnerabilities. Successful completion of two pre-requisite courses, Network+ and Security+, is highly recommended..
 
By choosing online learning instead of a classroom based course, it eliminates the need for time away from work, saving you valuable time and money. It is ideal for those with tight schedules as our online courses give you 12 months unlimited access to all the course materials, so you can study at a pace that suits you. Allowing you to easily resume your studies whenever you have the time. All you need is internet connection to study, so you can study from the comfort of your home or any environment that suits you."

"Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

Subjects

  • Compliance
  • Options
  • Testing
  • Windows
  • Networks
  • Linux
  • Server
  • SQL
  • Network
  • Protocol
  • DNS
  • Hacking
  • WAP
  • DOS
  • Web
  • Engineering
  • Web Server
  • Network Training
  • WiFi training
  • Wireless

Course programme

"

Course Outline


Course Outline

CompTIA PenTest+ course outline

Module 1 - The Pen Test Engagement

  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act

Module 2 - Passive Reconnaissance

  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review

Module 3 - Active Reconnaissance

  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License

Module 4 - Physical Security

  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review

Module 5 - Social Engineering

  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review

Module 6 - Vulnerability Scan Analysis

  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review

Module 7 - Password Cracking

  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review

Module 8 - Penetrating Wired Networks

  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review

Module 9 - Penetrating Wireless Networks

  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks

Module 10 - Windows Exploits

  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes

Module 11 - Linux Exploits

  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review

Module 12 - Mobile Devices

  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review

Module 13 - Specialized Systems

  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review

Module 14 - Scripts

  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review

Module 15 - Application Testing

  • 15.1 Application Testing
  • 15.2 Reverse Engineering

Module 16 - Web App Exploits

  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking - SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review

Module 17 - Lateral Movement

  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review

Module 18 - Persistence

  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review

Module 19 - Cover Your Tracks

  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks - Timestomp Files Act
  • 19.3 Cover Your Tracks - Frame the Administrator Act
  • 19.4 Cover Your Tracks - Clear the Event Log Act
  • 19.5 Cover Your Tracks Review

Module 20 - The Report

  • 20.1 The Report
  • 20.2 The Report Review

Module 21 - Post Engagement Cleanup

  • 21.1 Post Engagement Cleanup
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4


CompTIA PenTest+ course outline

Module 1 - The Pen Test Engagement


  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act

  • 1.0 PenTest Plus Introduction

  • 1.1 PenTest Plus Topics

  • 1.2 PenTest Engagement

  • 1.3 Threat Modeling

  • 1.4 Technical Constraints

  • 1.5 PenTest Engagement Review

  • 1.6 Examining PenTest Engagement Documents Act

  • Module 2 - Passive Reconnaissance


    • 2.1 Passive Reconnaissance part1
    • 2.2 WHOIS Act
    • 2.3 Passive Reconnaissance part2
    • 2.4 Google Hacking Act
    • 2.5 Passive Reconnaissance part3
    • 2.6 DNS Querying Act
    • 2.7 Passive Reconnaissance part4
    • 2.8 Email Server Querying Act
    • 2.9 SSL-TLS Cerfificates
    • 2.10 Shodan Act
    • 2.11 The Havester
    • 2.12 TheHarvester Act
    • 2.13 Recon-ng
    • 2.14 Recon-g Act
    • 2.14 Recon-ng-Part-2-API-key Act
    • 2.15 Maltego
    • 2.16 Have I been Pwned
    • 2.17 Punked and Owned Pwned Act
    • 2.18 Fingerprinting Organization with Collected Archives
    • 2.19 FOCA Act
    • 2.20 Findings Analysis Weaponization
    • 2.21 Chp 2 Review

  • 2.1 Passive Reconnaissance part1

  • 2.2 WHOIS Act

  • 2.3 Passive Reconnaissance part2

  • 2.4 Google Hacking Act

  • 2.5 Passive Reconnaissance part3

  • 2.6 DNS Querying Act

  • 2.7 Passive Reconnaissance part4

  • 2.8 Email Server Querying Act

  • 2.9 SSL-TLS Cerfificates

  • 2.10 Shodan Act

  • 2.11 The Havester

  • 2.12 TheHarvester Act

  • 2.13 Recon-ng

  • 2.14 Recon-g Act

  • 2.14 Recon-ng-Part-2-API-key Act

  • 2.15 Maltego

  • 2.16 Have I been Pwned

  • 2.17 Punked and Owned Pwned Act

  • 2.18 Fingerprinting Organization with Collected Archives

  • 2.19 FOCA Act

  • 2.20 Findings Analysis Weaponization

  • 2.21 Chp 2 Review

  • Module 3 - Active Reconnaissance


    • 3.1 Active Reconnaissannce
    • 3.2 Discovery Scans Act
    • 3.3 Nmap
    • 3.4 Nmap Scans Types Act
    • 3.5 Nmap Options
    • 3.6 Nmap Options Act
    • 3.7 Stealth Scans
    • 3.8 Nmap Stealth Scans Act
    • 3.9 Full Scans
    • 3.10 Full Scans Act
    • 3.11 Packet Crafting
    • 3.12 Packet Crafting Act
    • 3.13 Network Mapping
    • 3.14 Metasploit
    • 3.15 Scanning with Metasploit Act
    • 3.16 Enumeration
    • 3.17 Banner Grabbing Act
    • 3.18 Windows Host Enumeration
    • 3.19 Winddows Host Enumeration Act
    • 3.20 Linux Host Enumeration
    • 3.21 Linux Host Enumeration Act
    • 3.22 Service Enumeration
    • 3.23 Service Enumeration Act
    • 3.24 Network Shares
    • 3.25 SMB Share Enumeration Act
    • 3.26 NFS Network Share Enumeration
    • 3.27 NFS Share Enumeration Act
    • 3.28 Null Sessions
    • 3.29 Null Sessions Act
    • 3.30 Website Enumeration
    • 3.31 Website Enumeration Act
    • 3.32 Vulnerability Scans
    • 3.33 Compliance Scans Act
    • 3.34 Credentialed Non-credentialed Scans
    • 3.35 Using Credentials in Scans Act
    • 3.36 Server Service Vulnerability Scan
    • 3.37 Vulnerability Scanning Act
    • 3.38 Web Server Database Vulnerability Scan
    • 3.39 SQL Vulnerability Scanning Act
    • 3.40 Vulnerability Scan Part 2 OpenVAS Act
    • 3.41 Web App Vulnerability Scan
    • 3.42 Web App Vulnerability Scanning Act
    • 3.43 Network Device Vulnerability Scan
    • 3.44 Network Device Vuln Scanning Act
    • 3.45 Nmap Scripts
    • 3.46 Using Nmap Scripts for Vuln Scanning Act
    • 3.47 Packet Crafting for Vulnerbility Scans
    • 3.48 Firewall Vulnerability Scans
    • 3.49 Wireless Access Point Vunerability
    • 3.50 Wireless AP Scans Act
    • 3.51 WAP Vulnerability Scans
    • 3.52 Container Security issues
    • 3.53 How to Update Metasploit Pro Expired Trial License

  • 3.1 Active Reconnaissannce

  • 3.2 Discovery Scans Act

  • 3.3 Nmap

  • 3.4 Nmap Scans Types Act

  • 3.5 Nmap Options

  • 3.6 Nmap Options Act

  • 3.7 Stealth Scans

  • 3.8 Nmap Stealth Scans Act

  • 3.9 Full Scans

  • 3.10 Full Scans Act

  • 3.11 Packet Crafting

  • 3.12 Packet Crafting Act

  • 3.13 Network Mapping

  • 3.14 Metasploit

  • 3.15 Scanning with Metasploit Act

  • 3.16 Enumeration

  • 3.17 Banner Grabbing Act

  • 3.18 Windows Host Enumeration

  • 3.19 Winddows Host Enumeration Act

  • 3.20 Linux Host Enumeration

  • 3.21 Linux Host Enumeration Act

  • 3.22 Service Enumeration

  • 3.23 Service Enumeration Act

  • 3.24 Network Shares

  • 3.25 SMB Share Enumeration Act

  • 3.26 NFS Network Share Enumeration

  • 3.27 NFS Share Enumeration Act

  • 3.28 Null Sessions

  • 3.29 Null Sessions Act

  • 3.30 Website Enumeration

  • 3.31 Website Enumeration Act

  • 3.32 Vulnerability Scans

  • 3.33 Compliance Scans Act

  • 3.34 Credentialed Non-credentialed Scans

  • 3.35 Using Credentials in Scans Act

  • 3.36 Server Service Vulnerability Scan

  • 3.37 Vulnerability Scanning Act

  • 3.38 Web Server Database Vulnerability Scan

  • 3.39 SQL Vulnerability Scanning Act

  • 3.40 Vulnerability Scan Part 2 OpenVAS Act

  • 3.41 Web App Vulnerability Scan

  • 3.42 Web App Vulnerability Scanning Act

  • 3.43 Network Device Vulnerability Scan

  • 3.44 Network Device Vuln Scanning Act

  • 3.45 Nmap Scripts

  • 3.46 Using Nmap Scripts for Vuln Scanning Act

  • 3.47 Packet Crafting for Vulnerbility Scans

  • 3.48 Firewall Vulnerability Scans

  • 3.49 Wireless Access Point Vunerability

  • 3.50 Wireless AP Scans Act

  • 3.51 WAP Vulnerability Scans

  • 3.52 Container Security issues

  • 3.53 How to Update Metasploit Pro Expired Trial License

  • Module 4 - Physical Security


    • 4.1 Physical Security
    • 4.2 Badge Cloning Act
    • 4.3 Physical Security Review

  • 4.1 Physical Security

  • 4.2 Badge Cloning Act

  • 4.3 Physical Security Review

  • Module 5 - Social Engineering


    • 5.1 Social Engineering
    • 5.2 Using Baited USB Stick Act
    • 5.3 Using Social Enginnering to Assist Attacks
    • 5.4 Phishing Act
    • 5.5 Social Engineering Review

  • 5.1 Social Engineering

  • 5.2 Using Baited USB Stick Act

  • 5.3 Using Social Enginnering to Assist Attacks

  • 5.4 Phishing Act

  • 5.5 Social Engineering Review

  • Module 6 - Vulnerability Scan Analysis


    • 6.1 Vulnerbility Scan Analysis
    • 6.2 Validating Vulnerability Scan Results Act
    • 6.3 Vulnerbility Scan Analysis Review

  • 6.1 Vulnerbility Scan Analysis

  • 6.2 Validating Vulnerability Scan Results Act

  • 6.3 Vulnerbility Scan Analysis Review

  • Module 7 - Password Cracking


    • 7.1 Password Cracking
    • 7.2 Brute Force Attack Against Network Service Act
    • 7.3 Network Authentication Interception Attack
    • 7.4 Intercepting Network Authentication Act
    • 7.5 Pass the Hash Attacks
    • 7.6 Pass the Hash Act
    • 7.7 Password Cracking Review

  • 7.1 Password Cracking

  • 7.2 Brute Force Attack Against Network Service Act

  • 7.3 Network Authentication Interception Attack

  • 7.4 Intercepting Network Authentication Act

  • 7.5 Pass the Hash Attacks

  • 7.6 Pass the Hash Act

  • 7.7 Password Cracking Review

  • Module 8 - Penetrating Wired Networks


    • 8.1 Penetrating Wired Network
    • 8.2 Sniffing Act
    • 8.3 Eavesdropping
    • 8.4 Eavesdropping Act
    • 8.5 ARP Poisoning
    • 8.6 ARP Poisoning Act
    • 8.7 Man In The Middle
    • 8.8 MITM Act
    • 8.9 TCP Session HiJacking
    • 8.10 Server Message Blocks SMB Exploits
    • 8.11 SMB Attack Act
    • 8.12 Web Server Attacks
    • 8.13 FTP Attacks
    • 8.14 Telnet Server Attacks
    • 8.15 SSH Server Attacks
    • 8.16 Simple Network Mgmt Protocol SNMP
    • 8.17 Simple Mail Transfer Protocol SMTP
    • 8.18 Domain Name System DNS Cache Poisoning
    • 8.19 Denail of Service Attack DoS-DDoS
    • 8.20 DoS Attack Act
    • 8.21 VLAN Hopping Review

  • 8.1 Penetrating Wired Network

  • 8.2 Sniffing Act

  • 8.3 Eavesdropping

  • 8.4 Eavesdropping Act

  • 8.5 ARP Poisoning

  • 8.6 ARP Poisoning Act

  • 8.7 Man In The Middle

  • 8.8 MITM Act

  • 8.9 TCP Session HiJacking

  • 8.10 Server Message Blocks SMB Exploits

  • 8.11 SMB Attack Act

  • 8.12 Web Server Attacks

  • 8.13 FTP Attacks

  • 8.14 Telnet Server Attacks

  • 8.15 SSH Server Attacks

  • 8.16 Simple Network Mgmt Protocol SNMP

  • 8.17 Simple Mail Transfer Protocol SMTP

  • 8.18 Domain Name System DNS Cache Poisoning

  • 8.19 Denail of Service Attack DoS-DDoS

  • 8.20 DoS Attack Act

  • 8.21 VLAN Hopping Review

  • Module 9 - Penetrating Wireless Networks


    • 9.1 Penetrating Wireless Networks
    • 9.2 Jamming Act
    • 9.3 Wireless Sniffing
    • 9.4 Replay Attacks
    • 9.5 WEP Cracking Act
    • 9.6 WPA-WPA2 Cracking
    • 9.7 WAP Cracking Act
    • 9.8 Evil Twin Attacks
    • 9.9 Evil Twin Attack Act
    • 9.10 WiFi Protected Setup
    • 9.11 Bluetooth Attacks
    • 9.12 Penetrating Wireless Networks

  • 9.1 Penetrating Wireless Networks

  • 9.2 Jamming Act

  • 9.3 Wireless Sniffing

  • 9.4 Replay Attacks

  • 9.5 WEP Cracking Act

  • 9.6 WPA-WPA2 Cracking

  • 9.7 WAP Cracking Act

  • 9.8 Evil Twin Attacks

  • 9.9 Evil Twin Attack Act

  • 9.10 WiFi Protected Setup

  • 9.11 Bluetooth Attacks

  • 9.12 Penetrating Wireless Networks

  • Module 10 - Windows Exploits


    • 10.1 Windows Exploits
    • 10.2 Dumping Stored Passwords Act
    • 10.3 Dictionary Attacks
    • "

    Call the centre

    CompTIA PenTest+ Course

    Special Emagister price

    £ 195 £ 395 VAT inc.