Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You’ll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.
If you’re preparing to take the CompTIA Pentest+ exam you will need to understand a few key skills. In this course, Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+, you’ll develop the knowledge and skills required to research attack vectors and perform digital, physical, and social engineering attacks against various technologies. First, you’ll explore how to exploit specialized systems such as mobile devices, the Internet of Things, industrial control systems, and virtualization and containerization technologies. Next, you’ll discover how to influence people to conduct social engineering and physical attacks. Finally, you’ll learn how to perform post-exploitation activities to gain further access to systems, retain access, escalate privileges, avoid detection, and exfiltrate data. When you’re finished with this course, you’ll have the skills and knowledge to research attack vectors and perform attacks against specialized systems, conduct physical and social engineering attacks and apply post-exploitation techniques in preparation for the CompTIA Pentest+ exam.
Author Name: Matthew Lloyd Davies
Author Description:
Matt is a cyber security author and researcher here at Pluralsight. A certified penetration tester and incident handler, he created Pluralsight’s CompTIA Pentest+ Specialized Attacks courses as well our courses on wireless, ICS/OT and hardware hacking. Matt has also helped to build our security labs portfolio; labs that help you get hands-on to understand the threats and vulnerabilities your organization faces today. With a background in Chemical Engineering, Matt’s focus is on the security … more
Table of Contents
- Course Overview
1min - Attacks Against Cloud Technologies
30mins - Attacking and Exploiting Specialized Systems
44mins - Social Engineering and Physical Attacks
31mins - Post-exploitation
45mins - Domain Summary
5mins
There are no reviews yet.