CompTIA PenTest+ (PT0-001) Ethical Hacking Course

181 Enrolled
10 Hours
You save 92% -

67 Lessons (10h)

  • Your First Program
  • Introduction to PenTest+
    Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking8:40
  • Chapter 1: Planning and Scoping
    Planning a Pen Test8:54
    Rules of Engagement10:41
    Resources and Budgets7:21
    Impact and Constraints5:17
    Support Resources13:26
    Legal Groundwork11:57
    Scope Considerations10:51
    Lab Environment Setup22:56
    Project Strategy and Risk9:24
    Scope Vulnerabilities13:32
    Compliance-Based Assessments5:25
  • Chapter 2: Surveying the Target
    Scanning and Enumeration4:35
    Scanning and Enumeration Demo10:59
    Packet Investigation8:03
    Packet Inspection Demo6:02
    Application and Open-Source Resources11:52
    Vulnerability Scanning8:50
    Vulnebarility Scanning Demo16:31
    Target and Asset Considerations15:39
    Nmap Timing and Performance Options6:43
    Prioritization of Vulnerabilities9:17
    Common Attack Techniques12:17
    Credential Attacks14:41
    Weaknesses in Specialized Systems18:08
  • Chapter 3: Selecting Your Attack Vector
    Remote Social Engineering6:50
    Spear Phishing Demo10:19
    In-Person Social Engineering12:00
    Network-Based Exploits7:19
    FTP Exploit Demo8:28
    Man-in-the Middle Exploits7:18
    Wireless Exploits13:29
    Application Exploits, Part 15:41
    SQL Injection Demo8:48
    Application Exploits, Part 28:14
    Application Exploits, Part 39:15
    Cross-Site Scripting Demo7:11
    Code Vulnerabilities16:48
    Local Host Vulnerabilities5:08
    Privilege Escalation (Linux)9:49
    Privilege Escalation (Windows)6:17
    Misc. Privilege Escalation8:07
    Misc. Local Host Vulnerabilities8:17
    Physical Security11:27
    Post-Exploitation Techniques11:23
    Persistence and Stealth10:55
  • Chapter 4: Selecting Pen Testing Tools
    Nmap Scoping and Output Options21:15
    Pen Testing Toolbox6:59
    Using Kali Linux6:27
    Scanners and Credential Tools10:22
    Code Cracking Tools4:35
    Open-Source Research Tools6:36
    Wireless and Web Pen Testing Tools11:03
    Remote Access Tools6:28
    Analyzers and Mobile Pen Testing Tools2:43
    Other Pen Testing Tools4:39
    Using Scripting in Pen Testing12:46
    Bash Scripting Basics15:10
    Bash Scripting Techniques10:21
    PowerShell Scripts4:16
    Ruby Scripts6:43
    Python Scripts5:59
    Scripting Languages Comparison11:06
  • Chapter 5: Reporting and Communication
    Writing Reports16:02
    Post-Report Activities5:36
    Mitigation Strategies5:13

Hone Your Cybersecurity Skills with 10-Hour Course on Penetration Testing & Vulnerability Management

Total Seminars


Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.


Penetration testing and information security is one of the fastest-growing job categories according to the U.S. Bureau of Labor Statistics. Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. This course focuses on how to be a pen tester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

  • Access 67 lectures & 10 hours of content 24/7
  • Use the tools you’ll need to scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish


Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: intermediate


  • Internet access required


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...