PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The PT0-002 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA PT0-002 test with flying colors.
Curriculum for PT0-002 Certification Video Course
Name of Video | Time |
---|---|
1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3) |
2:26 |
2. Risk (OBJ 1.2) |
9:11 |
3. Risk Handling (OBJ 1.2) |
7:52 |
4. Controls (OBJ 1.2) |
7:30 |
5. PenTest Methodologies (OBJ 1.2) |
7:55 |
6. PenTest Standards (OBJ 1.2) |
7:06 |
7. Planning a Test (OBJ 1.2) |
9:39 |
8. Legal Concepts (OBJ 1.1) |
8:20 |
9. Regulatory Compliance (OBJ 1.1) |
15:16 |
10. Professionalism (OBJ 1.3) |
10:31 |
Name of Video | Time |
---|---|
1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3) |
3:35 |
2. Defining the Scope (OBJ 1.2) |
6:57 |
3. Adversary Emulation (OBJ 1.2) |
11:54 |
4. Target List (OBJ 1.2) |
10:56 |
5. Identifying Restrictions (OBJ 1.1) |
8:01 |
6. Rules of Engagement (OBJ 1.2) |
7:45 |
7. Assessment Types (OBJ 1.3) |
8:59 |
8. Validating the Scope (OBJ 1.2) |
5:17 |
9. Limitations and Permission (OBJ 1.1 and 1.3) |
6:57 |
10. Build a Virtual Lab |
16:39 |
Name of Video | Time |
---|---|
1. Passive Reconnaissance (OBJ 2.1) |
2:39 |
2. Information Gathering (OBJ 2.1) |
5:57 |
3. Open-Source Intelligence (OSINT) (OBJ 2.1) |
5:36 |
4. Social Media Scraping (OBJ 2.1) |
2:29 |
5. OSINT Tools (OBJ 2.1) |
11:43 |
6. Using OSINT Tools (OBJ 2.1) |
26:35 |
7. DNS Information (OBJ 2.1) |
9:04 |
8. Reconnaissance with CentralOps (OBJ 2.1) |
13:05 |
9. Public Repositories (OBJ2.1) |
4:40 |
10. Search Engine Analysis (OBJ 2.1) |
6:21 |
11. URL Analysis (OBJ 2.1) |
15:20 |
12. Cryptographic Flaws (OBJ 2.1) |
16:31 |
13. CWE & CVE (OBJ 2.1) |
6:24 |
Name of Video | Time |
---|---|
1. Active Reconnaissance (OBJ 2.2 and 2.3) |
2:19 |
2. Scanning and Enumeration (OBJ 2.2 and 2.3) |
10:07 |
3. Conducting Enumeration (OBJ 2.3) |
14:57 |
4. Other Enumeration (OBJ 2.2 and 2.3) |
9:24 |
5. Website Reconnaissance (OBJ 2.3) |
8:45 |
6. Detecting and Evading Defenses (OBJ 2.2) |
9:47 |
7. Packet Crafting (OBJ 2.2) |
10:29 |
8. Eavesdropping (OBJ 2.2) |
10:15 |
9. Wardriving (OBJ 2.2) |
8:17 |
10. DNS and ARP Analysis (OBJ 2.3) |
23:00 |
11. Network Traffic Analysis (OBJ 2.3) |
17:53 |
Name of Video | Time |
---|---|
1. Vulnerability Scanning (OBJ 2.3 and 2.4) |
1:57 |
2. Vulnerability Lifecycle (OBJ 2.3 and 2.4) |
8:36 |
3. Vulnerability Scans (OBJ 2.3 and 2.4) |
11:10 |
4. Scanning Considerations (OBJ 2.3 and 2.4) |
9:22 |
5. Nessus Scanning (OBJ 2.3 and 2.4) |
9:09 |
6. OpenVas Scanning (OBJ 2.3 and 2.4) |
13:35 |
7. Nikto Scanning (OBJ 2.3 and 2.4) |
5:19 |
Name of Video | Time |
---|---|
1. Nmap (OBJ 2.3 and 2.4) |
2:31 |
2. Nmap Discovery Scans (OBJ 2.3 and 2.4) |
7:54 |
3. Nmap Port Scans (OBJ 2.3 and 2.4) |
9:13 |
4. Nmap Fingerprinting (OBJ 2.3 and 2.4) |
4:13 |
5. Using Nmap (OBJ 2.3 and 2.4) |
11:32 |
6. Nmap Scripting Engine (OBJ 2.3 and 2.4) |
20:21 |
Name of Video | Time |
---|---|
1. Social Engineering and Physical Attacks (OBJ 3.6) |
3:36 |
2. Methods of Influence (OBJ 3.6) |
11:11 |
3. Social Engineering (OBJ 3.6) |
14:00 |
4. Phishing Campaigns (OBJ 3.6) |
5:14 |
5. Social Engineering Toolkit (OBJ 3.6) |
13:38 |
6. Pretexting (OBJ 3.6) |
4:08 |
7. Baiting Victims (OBJ 3.6) |
5:49 |
8. Impersonation (OBJ 3.6) |
4:17 |
9. Physical Security (OBJ 3.6) |
15:43 |
10. Lock Picking (OBJ 3.6) |
1:37 |
11. Physical Attacks (OBJ 3.6) |
10:25 |
12. Social Engineering Tools (OBJ 3.6) |
4:15 |
Name of Video | Time |
---|---|
1. Wireless Attacks (OBJ 3.2) |
3:24 |
2. Wireless Security (OBJ 3.2) |
16:38 |
3. Bypassing MAC Filtering (OBJ 3.2) |
4:08 |
4. Signal Exploitation (OBJ 3.2) |
11:16 |
5. WEP Hacking (OBJ 3.2) |
9:22 |
6. WPA/WPA2 Hacking (OBJ 3.2) |
8:37 |
7. WPS PIN Attacks (OBJ 3.2) |
11:45 |
8. Evil Twins (OBJ 3.2) |
5:53 |
9. On-path and Relay Attacks (OBJ 3.2) |
4:47 |
10. Bluetooth Attacks (OBJ 3.2) |
5:50 |
11. RFID and NFC Attacks (OBJ 3.2) |
4:46 |
Name of Video | Time |
---|---|
1. Network Attacks (OBJ 3.1) |
2:30 |
2. Stress Testing (OBJ 3.1) |
6:33 |
3. Exploit Resources (OBJ 3.1) |
6:23 |
4. ARP Poisoning (OBJ 3.1) |
7:17 |
5. DNS Cache Poisoning (OBJ 3.1) |
12:37 |
6. LLMNR/NBT-NS Poisoning (OBJ 3.1) |
4:50 |
7. MAC Spoofing (OBJ 3.1) |
5:23 |
8. VLAN Hopping (OBJ 3.1) |
6:56 |
9. NAC Bypass (OBJ 3.1) |
4:51 |
10. On-path Attack (OBJ 3.1) |
3:58 |
11. Password Attacks (OBJ 3.1) |
10:09 |
12. Pass the Hash (OBJ 3.1) |
7:55 |
13. Intro to Metasploit (OBJ 3.1) |
18:53 |
14. Netcat (OBJ 3.1) |
7:41 |
15. Using Netcat (OBJ 3.1) |
10:59 |
Name of Video | Time |
---|---|
1. Application Vulnerabilities (OBJ 3.3) |
5:43 |
2. Race Conditions (OBJ 3.3) |
4:55 |
3. Buffer Overflows (OBJ 3.3) |
12:23 |
4. Buffer Overflow Attacks (OBJ 3.3) |
6:25 |
5. Authentication and References (OBJ 3.3) |
4:44 |
6. Improper Error Handling (OBJ 3.3) |
5:11 |
7. Improper Headers (OBJ 3.3) |
6:06 |
8. Code Signing (OBJ 3.3) |
1:56 |
9. Vulnerable Components (OBJ 3.3) |
11:42 |
10. Software Composition (OBJ 3.3) |
9:46 |
11. Privilege Escalation (OBJ 3.3) |
6:09 |
12. Conducting Privilege Escalation (OBJ 3.3) |
13:06 |
Name of Video | Time |
---|---|
1. Application Attacks (OBJ 3.3) |
2:36 |
2. Directory Traversals (OBJ 3.3) |
9:32 |
3. Dirbuster (OBJ 3.3) |
7:15 |
4. Cross-Site Scripting (XSS) (OBJ 3.3) |
8:56 |
5. Cross-Site Request Forgery (CSRF) (OBJ 3.3) |
7:10 |
6. SQL Injections (OBJ 3.3) |
6:58 |
7. Conducting SQL Injections (OBJ 3.3) |
8:26 |
8. Burp Suite and SQLmap (OBJ 3.3) |
10:06 |
9. OWASP ZAP (OBJ 3.3) |
2:49 |
10. XML Injections (OBJ 3.3) |
6:20 |
11. Other Injection Attacks (OBJ 3.3) |
3:21 |
12. Attacking Web Applications (OBJ 3.3) |
15:36 |
Name of Video | Time |
---|---|
1. Cloud Attacks (OBJ 3.4) |
2:08 |
2. Attacking the Cloud (OBJ 3.4) |
6:54 |
3. Credential Harvesting (OBJ 3.4) |
8:17 |
4. Misconfigured Assets (OBJ 3.4) |
12:12 |
5. Metadata Service Attack (OBJ 3.4) |
4:32 |
6. Software Development Kit (SDK) (OBJ 3.4) |
2:55 |
7. Auditing the Cloud (OBJ 3.4) |
5:04 |
8. Conducting Cloud Audits (OBJ 3.4) |
13:59 |
Name of Video | Time |
---|---|
1. Attacks on Mobile Devices (OBJ 3.5) |
4:46 |
2. Enterprise Mobility Management (OBJ 3.5) |
9:32 |
3. Deployment Options (OBJ 3.5) |
4:34 |
4. Mobile Reconnaissance Concerns (OBJ 3.5) |
7:57 |
5. Mobile Device Insecurity (OBJ 3.5) |
12:15 |
6. Multifactor Authentication (OBJ 3.5) |
12:11 |
7. Mobile Device Attacks (OBJ 3.5) |
5:14 |
8. Malware Analysis (OBJ 3.5) |
13:13 |
9. Conducting Malware Analysis (OBJ 3.5) |
25:55 |
10. Mobile Device Tools (OBJ 3.5) |
8:21 |
Name of Video | Time |
---|---|
1. Attacks on Specialized Systems (OBJ 3.5) |
2:44 |
2. Internet of Things (IoT) Devices (OBJ 3.5) |
8:17 |
3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5) |
7:35 |
4. Embedded Systems (OBJ 3.5) |
6:45 |
5. ICS and SCADA Devices (OBJ 3.5) |
9:16 |
6. ICS Protocols and Vulnerabilities (OBJ 3.5) |
10:51 |
7. Data Storage Vulnerabilities (OBJ 3.5) |
5:58 |
8. Virtual Environments (OBJ 3.5) |
8:16 |
9. Virtual Machine Attacks (OBJ 3.5) |
5:56 |
10. Containerization (OBJ 3.5 |
5:45 |
Name of Video | Time |
---|---|
1. Post-exploitation (OBJ 3.7) |
2:51 |
2. Enumerating the Network (OBJ 3.7) |
4:04 |
3. Network Segmentation Testing (OBJ 3.7) |
3:10 |
4. Lateral Movement and Pivoting (OBJ 3.7) |
2:58 |
5. Pass the Hash (OBJ 3.7) |
7:49 |
6. Golden Ticket (OBJ 3.7) |
6:05 |
7. Lateral Movement (OBJ 3.7) |
8:31 |
8. Pivoting (3.7) |
7:42 |
9. Escalating Privileges (OBJ 3.7) |
19:14 |
10. Upgrading Restrictive Shells (OBJ 3.7) |
5:26 |
Name of Video | Time |
---|---|
1. Detection Avoidance (OBJ 3.7) |
1:31 |
2. Trojans and Backdoors (OBJ 3.7) |
4:20 |
3. Creating Persistence (OBJ 3.7) |
13:51 |
4. Living Off the Land (OBJ 3.7) |
12:01 |
5. Data Exfiltration (OBJ 3.7) |
6:46 |
6. Covert Channels (OBJ 3.7) |
4:44 |
7. Steganography (3.7) |
2:58 |
8. Covering Your Tracks (OBJ 3.7) |
10:03 |
9. Persistence and Covering Your Tracks (OBJ 3.7) |
8:44 |
10. Post-Exploitation Tools (OBJ 3.7) |
3:00 |
Name of Video | Time |
---|---|
1. Communication and Reports (OBJ 4.3) |
1:44 |
2. Communication Paths (OBJ 4.3) |
5:25 |
3. Communication Triggers (OBJ 4.3) |
4:36 |
4. Reasons for Communication (OBJ 4.3) |
10:18 |
5. Presentation of Findings (4.1 & OBJ 4.3) |
6:05 |
6. Report Data Gathering (OBJ 4.1) |
3:38 |
7. Written Reports (OBJ 4.1) |
14:44 |
8. Common Themes (OBJ 4.1) |
3:01 |
9. Securing and Storing Reports (OBJ 4.1) |
5:06 |
Name of Video | Time |
---|---|
1. Findings and Remediations (OBJ 4.2) |
2:32 |
2. Security Control Categories (OBJ 4.2) |
13:35 |
3. Selecting Security Controls (OBJ 4.2) |
3:56 |
4. Physical Controls (OBJ 4.2) |
6:55 |
5. Operational Controls (OBJ 4.2) |
10:22 |
6. Administrative Controls (OBJ 4.2) |
14:23 |
7. System Hardening (OBJ 4.2) |
10:55 |
8. Secure Coding (OBJ 4.2) |
8:19 |
9. Implementing MFA (OBJ 4.2) |
6:21 |
10. Digital Certificates (OBJ 4.2) |
9:47 |
11. Other Technical Controls (OBJ 4.2) |
2:41 |
12. Mitigation Strategies (OBJ 4.2) |
8:07 |
Name of Video | Time |
---|---|
1. Post-report Activities (OBJ 4.2) |
2:42 |
2. Removing Shells and Tools (OBJ 4.2) |
2:53 |
3. Deleting Test Credentials (OBJ 4.2) |
1:53 |
4. Destroy Test Data (OBJ 4.2) |
2:51 |
5. Client Acceptance (OBJ 4.2) |
2:57 |
6. Attestation of Findings (OBJ 4.2) |
3:00 |
7. Lessons Learned (OBJ 4.2) |
4:04 |
8. Retesting (OBJ 4.2) |
2:42 |
Name of Video | Time |
---|---|
1. Scripting Basics (OBJ 5.1 & OBJ 5.2) |
2:24 |
2. Scripting Tools (OBJ 5.2) |
9:50 |
3. Variables (OBJ 5.1) |
7:52 |
4. Loops (OBJ 5.1) |
5:20 |
5. Logic Control (OBJ 5.1) |
4:35 |
6. Data Structures (OBJ 5.1) |
12:40 |
7. Object Oriented Programming (OBJ 5.1) |
6:59 |
Name of Video | Time |
---|---|
1. Analyzing Scripts (OBJ 5.2) |
5:18 |
2. Coding in Bash (OBJ 5.2) |
21:17 |
3. Bash Example (OBJ 5.2) |
4:35 |
4. Coding in PowerShell (OBJ 5.2) |
15:41 |
5. PowerShell Example (OBJ 5.2) |
3:25 |
6. Coding in Python (OBJ 5.2) |
19:52 |
7. Python Example (OBJ 5.2) |
3:40 |
8. Coding in Perl (OBJ 5.2) |
17:24 |
9. Perl Example (OBJ 5.2) |
16:11 |
10. Coding in JavaScript (OBJ 5.2) |
19:22 |
11. JavaScript Example (OBJ 5.2) |
9:48 |
12. Coding in Ruby (OBJ 5.2) |
13:43 |
13. Ruby Example (OBJ 5.2) |
4:15 |
Name of Video | Time |
---|---|
1. Exploits and Automation (OBJ 5.2) |
1:37 |
2. Exploits to Download Files (OBJ 5.2) |
4:27 |
3. Exploits for Remote Access (OBJ 5.2) |
9:26 |
4. Exploits for Enumerating Users (OBJ 5.2) |
5:57 |
5. Exploits for Enumerating Assets (OBJ 5.2) |
5:24 |
6. Automation in Engagements (OBJ 5.2) |
3:28 |
7. Automation with Nmap Scripts (OBJ 5.2) |
2:35 |
Name of Video | Time |
---|---|
1. Tool Round-up (OBJ 5.3) |
2:54 |
2. OSINT Tools (OBJ 5.3) |
6:14 |
3. Scanning Tools (OBJ 5.3) |
6:40 |
4. Networking Tools (OBJ 5.3) |
2:31 |
5. Wireless Tools (OBJ 5.3) |
7:37 |
6. Social Engineering Tools (OBJ 5.3) |
2:36 |
7. Remote Access Tools (OBJ 5.3) |
4:24 |
8. Credential Testing Tools (OBJ 5.3) |
7:39 |
9. Web Application Tools (OBJ 5.3) |
2:26 |
10. Cloud Tools (OBJ 5.3) |
2:59 |
11. Steganography Tools (OBJ 5.3) |
6:35 |
12. Debuggers (OBJ 5.3) |
5:32 |
13. Miscellaneous Tools (OBJ 5.3) |
9:27 |
Name of Video | Time |
---|---|
1. Conclusion |
9:13 |
100% Latest & Updated CompTIA PT0-002 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!
PT0-002 Premium Bundle
Free PT0-002 Exam Questions & PT0-002 Dumps
File Name | Size | Votes |
---|---|---|
File Name comptia.examcollection.pt0-002.v2024-09-15.by.oliver.32q.vce |
Size 2.42 MB |
Votes 1 |
File Name comptia.prep4sure.pt0-002.v2021-12-09.by.imogen.40q.vce |
Size 1.65 MB |
Votes 1 |
CompTIA PT0-002 Training Course
Want verified and proven knowledge for CompTIA PenTest+ Certification Exam? Believe it's easy when you have ExamSnap's CompTIA PenTest+ Certification Exam certification video training course by your side which along with our CompTIA PT0-002 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.
Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA PenTest+ Certification Exam certification video training course that goes in line with the corresponding CompTIA PT0-002 exam dumps, study guide, and practice test questions & answers.
Comments (0)
Please post your comments about PT0-002 Exams. Don't share your email address asking for PT0-002 braindumps or PT0-002 exam pdf files.
Purchase Individually
CompTIA Training Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Latest IT Certification News
LIMITED OFFER: GET 30% Discount
This is ONE TIME OFFER
A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.