Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
12m:23s

2.
Download your free study guide

3.
Exam Tips
4m:14s

4.
How to Use the Lab Environment
5m:27s

5.
Labs: Exploring the PenTest+ Lab Environment

6.
100% Pass Guarantee
3m:49s

7.
Checkpoint: Introduction

2 -
PenTesting Overview
#
Lesson
Duration
Type
1.
PenTesting Overview
2m:54s

2.
Planning the Engagement
4m:23s

3.
Information Gathering
4m:2s

4.
Attacks and Exploits
3m:29s

5.
Post-Exploitation
3m:4s

6.
Reporting
3m:47s

7.
Overview of a PenTest
9m:18s

8.
Checkpoint: PenTesting Overview

3 -
Pre-Engagement Activities
#
Lesson
Duration
Type
1.
Pre-Engagement Activities
3m:20s

2.
Regulations and Standards
6m:24s

3.
Types of Assessments
4m:32s

4.
Types of Agreements
4m:17s

5.
Legal and Ethical Considerations
4m:31s

6.
Rules of Engagement
4m:48s

7.
Target Selection
4m:54s

8.
Shared Responsibility Model
4m:23s

9.
Preparing to PenTest a Cloud Provider
4m:13s

10.
Checkpoint: Pre-Engagement Activities

4 -
Frameworks
#
Lesson
Duration
Type
1.
Frameworks
3m:43s

2.
MITRE ATT&CK
4m:54s

3.
OWASP
4m:55s

4.
MASVS
4m:14s

5.
PTES
5m:22s

6.
CREST
3m:54s

7.
OSSTMM
3m:8s

8.
STRIDE
5m:41s

9.
Purdue Model
3m:55s

10.
OCTAVE
6m:53s

11.
DREAD
5m:9s

12.
Using the MITRE ATT&CK Framework
4m:33s

13.
Checkpoint: Frameworks

5 -
Information Gathering
#
Lesson
Duration
Type
1.
Information Gathering
3m:9s

2.
Passive Reconnaissance
3m:30s

3.
Network Sniffing
5m:10s

4.
Active Reconnaissance
3m:47s

5.
Port and Protocol Scanning
5m:51s

6.
HTML Scraping and Cached Pages
2m:59s

7.
Banner Grabbing
5m:2s

8.
Conducting Banner Grabbing
3m:45s

9.
Checkpoint: Information Gathering

6 -
Open-Source Intelligence (OSINT)
#
Lesson
Duration
Type
1.
Open-Source Intelligence (OSINT)
2m:48s

2.
Social Media and Job Boards
4m:45s

3.
Information Disclosures
4m:8s

4.
Cryptographic Flaws
6m:31s

5.
DNS Lookups
7m:40s

6.
Certificate Transparency Logs
4m:50s

7.
Search Engine Analysis
4m:27s

8.
Conducting OSINT
10m:35s

9.
Checkpoint: Open-Source Intelligence (OSINT)

7 -
Scanning and Enumeration
#
Lesson
Duration
Type
1.
Scanning and Enumeration
3m:56s

2.
OS and Service Discovery
14m:58s

3.
Enumerating Protocols
4m:52s

4.
Enumerating DNS
3m:56s

5.
Enumerating Directories
5m:1s

6.
Enumerating Hosts
6m:44s

7.
Enumerating Users
2m:45s

8.
Enumerating Email
3m:17s

9.
Enumerating Permissions
4m:57s

10.
Enumerating Wireless Devices
4m:27s

11.
Enumerating Secrets
4m:53s

12.
Enumerating the Web
4m:38s

13.
Attack Path Mapping
3m:22s

14.
Checkpoint: Scanning and Enumeration

8 -
Recon and Enumeration Tools
#
Lesson
Duration
Type
1.
Reconnaissance and Enumeration Tools
3m:36s

2.
Wayback Machine
2m:46s

3.
theHarvester and Hunter.io
4m:54s

4.
OSINT Tools
4m:5s

5.
Whois and recon-ng
20m:32s

6.
nslookup and dig
6m:58s

7.
DNSdumpster and Amass
6m:30s

8.
Shodan and Censys.io
5m:42s

9.
tcpdump
5m:31s

10.
Wireshark
5m:42s

11.
Wireless Analysis Tools
5m:12s

12.
Checkpoint: Recon and Enumeration Tools

9 -
Nmap and NSE
#
Lesson
Duration
Type
1.
Nmap and NSE
2m:34s

2.
Nmap Discovery Scans
7m:54s

3.
Nmap Port Scans
9m:13s

4.
Nmap Fingerprinting
4m:13s

5.
Using Nmap
11m:31s

6.
Nmap Scripting Engine
7m:0s

7.
Checkpoint: Nmap and NSE

10 -
Scripting Basics
#
Lesson
Duration
Type
1.
Scripting Basics
2m:11s

2.
Shells and Programming Languages
9m:48s

3.
Variables
7m:52s

4.
Loops
5m:20s

5.
Logic Control
4m:33s

6.
Data Structures
12m:37s

7.
Object Oriented Programming
6m:58s

8.
Checkpoint: Scripting Basics

11 -
Modifying Scripts
#
Lesson
Duration
Type
1.
Modifying Scripts
2m:55s

2.
Bash Fundamentals
21m:16s

3.
Understanding a Bash Script
4m:31s

4.
Modifying a Bash Script
8m:44s

5.
PowerShell Fundamentals
15m:41s

6.
Understanding a PowerShell Script
3m:20s

7.
Modifying a PowerShell Script
7m:42s

8.
Python Fundamentals
20m:27s

9.
Understanding a Python Script
3m:35s

10.
Modifying a Python Script
5m:33s

11.
Checkpoint: Modifying Scripts

12 -
Analyzing Scans
#
Lesson
Duration
Type
1.
Analyzing Scans
3m:11s

2.
Positive and Negative Results
4m:12s

3.
Validating Scan Results
3m:56s

4.
Using CVEs and CVSS
6m:16s

5.
Exploit Prediction Scoring System
3m:44s

6.
Target Prioritization
3m:50s

7.
Common Target Criteria
4m:3s

8.
Scripting for Result Validation
3m:1s

9.
Scan Validations
3m:38s

10.
Capability Selection
4m:30s

11.
Documenting the Attack
6m:12s

12.
Other Attack Considerations
4m:25s

13.
Checkpoint: Analyzing Scans

13 -
Discovering Vulnerabilities
#
Lesson
Duration
Type
1.
Discovering Vulnerabilities
2m:14s

2.
Application Scanning
4m:55s

3.
Software Analysis
5m:54s

4.
Host-Based Scanning
4m:25s

5.
Network Scanning
5m:3s

6.
Mobile Scanning
3m:17s

7.
Container Scanning
5m:11s

8.
Scanning IaC
5m:34s

9.
ICS Vulnerability Discovery
5m:21s

10.
Wireless Scans
4m:56s

11.
Static Code Analysis (SonarQube)
5m:49s

12.
Checkpoint: Discovering Vulnerabilities

14 -
Vulnerability Discovery Tools
#
Lesson
Duration
Type
1.
Vulnerability Discovery Tools
2m:12s

2.
Nikto
5m:16s

3.
Greenbone/OpenVAS
13m:32s

4.
Trivy
3m:44s

5.
BloodHound
6m:6s

6.
PowerSploit
1m:30s

7.
Grype
3m:13s

8.
Kube-Hunter
3m:10s

9.
TruffleHog
3m:25s

10.
Checkpoint: Vulnerability Discovery Tools

15 -
Social Engineering Attacks
#
Lesson
Duration
Type
1.
Social Engineering Attacks
3m:15s

2.
Methods of Influence
11m:2s

3.
Phishing Campaigns
4m:35s

4.
Using the Social Engineering Toolkit (SET)
13m:38s

5.
Gophish
6m:12s

6.
Impersonation
4m:17s

7.
Surveillance Techniques
2m:45s

8.
Watering Hole
3m:2s

9.
Evilginx
5m:35s

10.
Tailgating and Piggybacking
3m:40s

11.
Browser Exploitation Framework (BeEF)
3m:4s

12.
Checkpoint: Social Engineering Attacks

16 -
Wireless Attacks
#
Lesson
Duration
Type
1.
Wireless Attacks
2m:38s

2.
Wireless Security
16m:26s

3.
Wireless Signal Exploitation
4m:1s

4.
Aircrack-ng
4m:54s

5.
Wireless Hacking
8m:34s

6.
WPS PIN Attacks
11m:37s

7.
Captive Portal Attacks
4m:28s

8.
Evil Twin
2m:59s

9.
Kismet
3m:51s

10.
Wi-Fi Protocol Fuzzing
4m:21s

11.
Checkpoint: Wireless Attacks

17 -
Network Attacks
#
Lesson
Duration
Type
1.
Network Attacks
3m:51s

2.
Stress Testing
6m:22s

3.
Bypassing Segmentation
5m:21s

4.
MAC Spoofing
5m:12s

5.
NAC Bypass
4m:42s

6.
Session-Based Attacks
3m:51s

7.
Service Exploitation
5m:25s

8.
Packet Crafting
4m:24s

9.
Netcat
7m:36s

10.
Using Netcat
10m:59s

11.
Default Network Credentials
5m:2s

12.
LLMNR/NBT-NS Poisoning
4m:43s

13.
ARP Poisoning
7m:5s

14.
Intro to Metasploit
5m:29s

15.
Checkpoint: Network Attacks

18 -
Authentication Attacks
#
Lesson
Duration
Type
1.
Authentication Attacks
3m:24s

2.
Types of Password Attack
4m:3s

3.
Password Cracking Tools
7m:54s

4.
Credential Attacks
7m:10s

5.
Credential Passing Attacks
5m:9s

6.
Directory Service Attacks
4m:16s

7.
CrackMapExec (CME)
2m:8s

8.
SAML Attacks
5m:27s

9.
OpenID Connect (OIDC) Attacks
5m:42s

10.
Hash Attacks
4m:3s

11.
Checkpoint: Authentication Attacks

19 -
Host Attacks
#
Lesson
Duration
Type
1.
Host Attacks
3m:16s

2.
Privilege Escalation
6m:31s

3.
Conducting Privilege Escalation
13m:6s

4.
Credential Harvesting
3m:55s

5.
Misconfigured Endpoints
3m:34s

6.
Unquoted Service Paths
4m:25s

7.
Disabling Security Software
6m:19s

8.
Payload Obfuscation
4m:27s

9.
User-Controlled Access Bypass
7m:2s

10.
Shell and Kiosk Escapes
3m:58s

11.
Library and Process Injection
6m:57s

12.
Log Tampering
3m:3s

13.
Living Off the Land
3m:28s

14.
Checkpoint: Host Attacks

20 -
Web Application Vulnerabilities
#
Lesson
Duration
Type
1.
Web Application Vulnerabilities
2m:51s

2.
Race Conditions
4m:53s

3.
Buffer Overflows
12m:26s

4.
Buffer Overflow Attacks
6m:13s

5.
Authentication Flaws and Insecure References
5m:53s

6.
Improper Error Handling
5m:13s

7.
Improper Headers
6m:8s

8.
Code Signing
1m:58s

9.
Vulnerable Components
11m:41s

10.
Software Composition
9m:46s

11.
Checkpoint: Web Application Vulnerabilities

21 -
Web Application Attacks
#
Lesson
Duration
Type
1.
Web Application Attacks
3m:20s

2.
Directory Traversals
9m:32s

3.
Directory Traversal Tools
10m:32s

4.
Cross-Site Scripting (XSS)
8m:56s

5.
Request Forgeries
4m:5s

6.
SQL Injections
7m:0s

7.
Performing SQL Injection Attacks
8m:27s

8.
Injection Attacks
5m:21s

9.
File Inclusions
3m:52s

10.
Arbitrary Code Execution
4m:20s

11.
Web Application Session Hijacking
5m:39s

12.
Abusing APIs
7m:17s

13.
OWASP ZAP
5m:7s

14.
Attacking Web Applications
15m:36s

15.
Checkpoint: Web Application Attacks

22 -
Cloud Attacks
#
Lesson
Duration
Type
1.
Cloud Attacks
2m:53s

2.
Identity and Access Management (IAM) Misconfigurations
4m:13s

3.
Resource Misconfigurations
4m:33s

4.
Logging Information Exposures
4m:32s

5.
Metadata Service Attacks
6m:27s

6.
Image and Artifact Tampering
5m:59s

7.
Supply Chain Attacks
4m:54s

8.
Container Exploits and Attacks
3m:46s

9.
Trust Relationship Abuse
6m:38s

10.
Third-party Integration Exploits
5m:12s

11.
Cloud Security Testing
6m:11s

12.
Conducting Cloud Audits
13m:58s

13.
Checkpoint: Cloud Attacks

23 -
Attacking Specialized Systems
#
Lesson
Duration
Type
1.
Attacking Specialized Systems
2m:46s

2.
Mobile Device Attacks
12m:15s

3.
Tools for Mobile Device Attacks
5m:8s

4.
Bluetooth Attacks
3m:9s

5.
NFC and RFID Attacks
4m:46s

6.
AI Attacks
4m:35s

7.
Operational Technology (OT)
9m:14s

8.
OT Attacks
10m:50s

9.
Testing OT Systems
3m:37s

10.
Checkpoint: Attacking Specialized Systems

24 -
Automated Attacks
#
Lesson
Duration
Type
1.
Automated Attacks
2m:58s

2.
Automating Attacks with Bash
3m:41s

3.
Empire/PowerSploit
4m:47s

4.
PowerView
4m:29s

5.
PowerUpSQL
5m:47s

6.
AD Search
5m:34s

7.
Impacket
3m:8s

8.
Scapy
6m:49s

9.
Caldera
4m:8s

10.
Infection Monkey
3m:9s

11.
Atomic Red Team
4m:10s

12.
Checkpoint: Automated Attacks

25 -
Persistence
#
Lesson
Duration
Type
1.
Persistence
2m:37s

2.
Command and Control
3m:41s

3.
Automating Persistence
5m:6s

4.
Remote Shells
4m:8s

5.
Using Remote Shells
4m:55s

6.
Backdoor
5m:53s

7.
Remote Access Trojans
5m:45s

8.
Account Credentials
5m:32s

9.
Browser-Based Persistence
5m:16s

10.
Security Control Tampering
6m:53s

11.
Checkpoint: Persistence

26 -
Lateral Movement
#
Lesson
Duration
Type
1.
Lateral Movement
3m:4s

2.
Pivoting and Relaying
3m:5s

3.
Using ProxyChains
7m:43s

4.
Enumerating for Lateral Movement
3m:21s

5.
Service Discovery
5m:41s

6.
Protocol Discovery
3m:0s

7.
Remote Access Discovery
4m:27s

8.
Printer Discovery
4m:19s

9.
Discovering Internal Websites
8m:26s

10.
Living Off the Land Tools
4m:30s

11.
sshuttle
4m:39s

12.
Covenant
5m:7s

13.
Checkpoint: Lateral Movement

27 -
Exfiltration
#
Lesson
Duration
Type
1.
Exfiltration
2m:33s

2.
Covert Channels
4m:4s

3.
Steganography
5m:46s

4.
Covert Channel Using DNS
7m:39s

5.
Covert Channel Using ICMP
3m:34s

6.
Covert Channel Using HTTPS
4m:42s

7.
Alternate Data Streams (ADS)
3m:50s

8.
Exfiltrating Data
4m:15s

9.
Checkpoint: Exfiltration

28 -
Cleanup and Restoration
#
Lesson
Duration
Type
1.
Cleanup and Restoration
2m:6s

2.
Persistence Removal
3m:20s

3.
Revert Configuration Changes
3m:23s

4.
Created Credentials Removal
2m:32s

5.
Removal of Testing Tools
2m:25s

6.
Decommission Testing Infrastructure
3m:9s

7.
Artifact Preservation
2m:38s

8.
Secure Data Destruction
2m:34s

9.
Checkpoint: Cleanup and Restoration

29 -
Remediation Recommendations
#
Lesson
Duration
Type
1.
Remediation Recommendations
2m:27s

2.
System Hardening
10m:50s

3.
User Input Sanitization
4m:42s

4.
Network and Infrastructure Controls
3m:55s

5.
Authentication Recommendations
4m:27s

6.
Encryption Recommendations
4m:45s

7.
Patch Management
3m:51s

8.
Process Level Remediation
2m:57s

9.
Administrative Controls
14m:20s

10.
Physical Controls
6m:55s

11.
Operational Controls and Policies
2m:55s

12.
Implementing Recommendations
8m:50s

13.
Checkpoint: Remediation Recommendations

30 -
Penetration Test Reporting
#
Lesson
Duration
Type
1.
Penetration Test Reporting
2m:30s

2.
Executive Summary Process
2m:57s

3.
Root Cause Analysis
4m:24s

4.
Report Components
4m:25s

5.
Risk Scoring and Prioritization
3m:39s

6.
Definitions in the Report
3m:37s

7.
Limits and Assumptions
4m:23s

8.
Special Considerations
5m:37s

9.
Report Analysis Workshop
7m:3s

10.
Checkpoint: Penetration Test Reporting

31 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
12m:47s

2.
BONUS: What comes next?
3m:44s

3.
Practice Exam
