Chương trình huấn luyện Comptia Pentest + trực tuyến và thực chiến trên lab thật (giảm giá 70 % cho 2 member)

Khuyến mãi còn 2 chổ cho Chương trình huấn luyện Comptia Pentest + trực tuyến và thực chiến trên lab thật. Chỉ cần trình duyệt để thực hành và làm bài tập. Có đánh giá và kiểm tra ở cuối mỗi chương để review kiến thức . Liên hệ đặt ngay qua Đông Dương Đại Hùng

Các bạn hãy tham khảo kỹ Nội Dung, phương pháp học và thời gian trước khi đặt câu hỏi để không bị trùng lắp

  • Sách tham khảo Comptia Pentest +
  • Lab Guide chi tiết trong hệ thống iLab, đây là các bài hướng dẫn thực hành hand on và step by step trên mô hình lab thật trực tuyến nên bất kì ai cũng dễ dàng thực hành, ở bất kì nơi đâu.
  • Đủ sức ôn luyện thi chứng chỉ quốc tế Comptia Pentest +

Hệ thống lab đầy đủ các máy thật Kali Linux, Domain Controller,Domain Server và 2 Domain Client

Thời hạn học tập thực hành 6 tháng : chi phí 5.000.000 VND

Giảm  3250 K còn 1.7500.000 VND

Đăng kí và nhận tài khỏan trong vòng 24 tiếng. Đăn kí và thanh toán học phí qua chuyển khoản đề số tài khoản trong phần Hướng Dẫn Đăng Kí

Đối tượng học viên :

  • Đã có kiến thức căn bản về mạng máy tính, kiến thức nền về Windows và Linux cũng như an toàn thông tin căn bản hoặc đã học qua Comptia Security +, Network_, Server+, Linux +

Lưu ý : Compo 4 tài khoản học trực tuyến và thực hành trên Lab thật thời hạn 6 tháng dành cho new bie (người mới) gồm

1.Comptia Security + (75$)  

2.Comptia Network + (75$)

3.Comptia Server +    (75$)

4.Comptia Linux +      (75$)

Giá compo 5.000.000 VND . Đây là starter SecCompo dành cho các bạn mới nghiên cứu và vào nghề InfoSEC.

Sau khi học xong có thể học nâng cao các môn như CEH, CHFI, Pentest+ hay các khóa bảo mật dành cho chuyên gia, nhà quản lý : CASP, CySA  …

Gói compo cần đặt trước và có tài học trong vòng 1 tuần.

Liên hệ Đông Dương Đại Hùng https://www.facebook.com/dongduongdaihung

A/ Phương pháp học : Đây là khóa học trực tuyến. Các bạn cần có máy tính kết nối với mạng internet, đăng nhập bằng tài khoản được cấp và thực hành theo hướng dẫn và các bài học step by step rất dễ thực tập (phải nói là trình độ PTTH vẫn có thể thực hành). Các bạn có thể đăng nhập vào khóa học 24 x7 trong vòng 6 tháng. Hỗ trợ kỹ thuật qua group học tập trên Facebook. Yêu cầu làm bài và học bài tuần tự, nếu chưa học bài 1 BQT sẽ không giải đáp các câu hỏi của bài 2 hay 3,4,5 …

B/ Nội Quy Khóa Học : Cần học và làm bài đầy đủ theo yêu cầu của khóa học đề ra và tiến hành theo learning path (xem trong phần D / Nội Dung Khóa Học. Nếu vi phạm quy chế có thể bị tạm khóa tài khoản cho đến khi hoàn thành bài tập phạt trên CBT Lab (lab chạy trên máy tính hoặc online)

C Chứng chỉ : Kết thúc khóa học và học viên thực hành trên 90 % bài lab + trả lời bảng khảo sát câu hỏi ôn tập sẽ được phép thi thực hành trên hệ thống Exam của CEH VIETNAM.

Nếu thi rớt đóng tiền thi lại trong vòng 2 tuần . Lệ phí thi lại là 50 $ / Nếu rớt lần 2 phải thì lại sau 4 tuần và đóng lệ phí 75 $. Các bài thi nằm trong phạm vi bài học với các mục tiêu pentest thật trên lab.

C/Tham khảo Nội Dung CompTIA PenTest+

The CompTIA PenTest+ (PT0-001) is an intermediate-to-advanced level certification to provide you with the hands-on skills of penetration testing (ethical hacking). You will learn how to locate and exploit vulnerabilities in a network – including breaches of applications, protocols, Application Programming Interfaces (APIs), servers and firewalls. After successful completion, you will be able to plan and prepare for a penetration test engagement, perform social engineering and password attacks, analyze and report pentest results, and more. All tasks are designed to set you up for success in cybersecurity. Good luck!

Lab Guides

Planning and Preparing for a Penetration Test Engagement

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1 – Explain Penetration Testing and its Importance
  • Exercise 2 – Use Serpico to Generate a Penetration report
  • Exercise 3 – Explain Penetration Testing Resources and Requirements
  • Exercise 4 – Explain Rules of Engagement, Contract Types, and Scoping an Engagement
  • Exercise 5 – Explain Different Testing Strategies
  • Exercise 6 – Explain Target Selection and Threat Actors
  • Exercise 7 – Explain Asset Categorization and Risk Assessment
  • Exercise 8 – Explain Compliance-based Assessments
  • Exercise 9 – Prepare for Penetration Test Engagement
  • Review

Welcome to the Planning and Preparing for a Penetration Test Engagement Practice Lab. In this module, you will be provided with the instructions needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Explain Penetration Testing and its Importance
  • Exercise 2 – Use Serpico to Generate a Penetration report
  • Exercise 3 – Explain Penetration Testing Resources and Requirements
  • Exercise 4 – Explain Rules of Engagement, Contract Types, and Scoping an Engagement
  • Exercise 5 – Explain Different Testing Strategies
  • Exercise 6 – Explain Target Selection and Threat Actors
  • Exercise 7 – Explain Asset Categorization and Risk Assessment
  • Exercise 8 – Explain Compliance-based Assessments
  • Exercise 9 – Prepare for Penetration Test Engagement

After completing this lab, you will be able to:

  • Access a List of Common Penetration Testing Tools
  • Access Zenmap in Kali Linux
  • Configure the Serpico Web Application
  • Know about Different Types of Resource Documents
  • Have an Overview of Budget Requirements and Technical Constraints
  • Download Sample Penetration Testing Agreements
  • Know about the Rules of Engagement
  • Assess Guidelines for Planning the Penetration Testing
  • Know about SOW, MSA, and NDA
  • Know about the Legal Restrictions including Local and National Government
  • Know about the Scopes in an Engagement
  • Difference between Black Box vs. White Box vs. Gray Box
  • Know about the Types of Targets and Threat Actors
  • Explain Types of Assets, Risk Responses, Tolerance to Impact and Risk Appetite
  • Key Aspects of Compliance-Based Assessments and their Limitations
  • Know Key Points to Prepare a Team for Penetration Testing
  • Explain Data Collection and Documentation
  • Generate a Penetration Test Report with Serpico
  • Explain Activity Assignment and Sequencing, Contingency Planning, Escalation Paths and Communications

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 1.1 Explain the importance of planning for an engagement
  • PT0-001: 1.2 Explain key legal concepts
  • PT0-001: 1.3 Explain the importance of scoping an engagement properly
  • PT0-001: 1.5 Explain the key aspects of compliance-based assessments

CompTIA PenTest+

Using the Metasploit Framework

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Using the Metasploit Framework
  • Exercise 2 – Setting the Module Options
  • Exercise 3 – Using Payloads
  • Exercise 4 – Creating Standalone Payloads with Msfvenom
  • Review

Introduction

Penetration Testing

PenTest+

Msfvenom

Metasploit Framework

Welcome to Using the Metasploit Framework Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Using the Metasploit Framework
  • Exercise 2 – Setting Module Options
  • Exercise 3 – Using Payloads
  • Exercise 4 – Creating Standalone Payloads with Msfvenom

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Start Metasploit
  • Find Metasploit Modules
  • Use the Modules Database
  • Set Module Options
  • Find Compatible Payloads
  • Explain the types of Shell Targets
  • Choose a Payload
  • Share the Payload with the Victim
  • Use the Multi/handler Module and Exploit the System

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 4.2 Compare and contrast various use cases of tools
  • PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate techniques

CompTIA PenTest+

Performing Social Engineering

Exercises

Introduction

Penetration Testing

PenTest+

Social Engineering

Social Engineering Toolkit (SET)

Reverse Handler

Payload

Welcome to the Performing Social Engineering Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Discuss Social Engineering
  • Exercise 2 – Using the Social-Engineer Toolkit (SET)

After completing this lab, you will be able to:

  • Know the Basic Components of Social Engineering
  • Know the Motivation Techniques
  • Know Phishing and its Types
  • Know Hoax, Baiting, Shoulder Surfing, Tailgating, and Piggybacking
  • Create a Malicious Payload
  • Copy the File to the User’s System
  • Download the Payload
  • Execute the Payload
  • Collect Evidence of Compromise on the User’s System

CompTIA PenTest+

Conducting Passive Reconnaissance for Vulnerabilities in a Network

Exercises

Introduction

Penetration Testing

Passive Reconnaissance

WHOis

Social Engineering

Maltego

Recon-ng

Metasploit

PenTest+

Welcome to Conducting Passive Reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Conducting Passive Reconnaissance for Vulnerabilities in a Network
  • Exercise 2 – Leveraging the Gathered Information

After completing this lab, you will be able to:

  • Use the WHOis Website
  • Perform Social Media Exploitation
  • Use Shodan
  • Use Google Hacking
  • Use DNS Querying
  • Use theHarvester
  • Use Recon-ng
  • Create a Temporary E-mail Account
  • Use Maltego
  • Find Analysis and Weaponization
  • Know about Content of Interest
  • Prepare for Next steps and its Guidelines

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
  • PT0-001: 2.2 Given a scenario, perform a vulnerability scan
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Conducting Active Reconnaissance for Vulnerabilities in a Network

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Conducting Active Reconnaissance in a Network
  • Review

Introduction

Penetration Testing

PenTest+

Active Reconnaissance

Nmap

Port

Service

Operating System

Welcome to the Conducting Active reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Conducting Active Reconnaissance in a Network

After completing this lab, you will be able to:

  • Identify Live Hosts on a Network
  • Perform Discovery Scans
  • Perform Port Scanning
  • Perform Stealth Scans
  • Perform Packet Crafting
  • Perform Fingerprinting
  • Perform Service Probing
  • Disable Ping Sweep
  • Use Timing Templates
  • Work with Nmap Output Parameters, such as oA, oN, oG, and oX

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
  • PT0-001: 4.1 Given a scenario, use Nmap to conduct information gathering exercises
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Perform Vulnerability Scan and Analyze Vulnerability Scan Results

Exercises

Introduction

Penetration Testing

PenTest+

Enumeration

Vulnerability Scan

Exploit

OpenVAS

Lynis

DNS Enumeration

Linux Host Enumeration

Windows Host Enumeration

wafw00f

HTTPrint

Nmap

Welcome to Perform Vulnerability Scan and Analyze Vulnerability Scan Results Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Perform Enumeration
  • Exercise 2 – Perform Vulnerability Scan
  • Exercise 3 – Analyze Vulnerability Scan Results and Prioritize Activities
  • Exercise 4 – Describe Common Techniques to Complete Attack

After completing this lab, you will be able to:

  • Perform DNS Enumeration
  • Switch Off the Windows Firewall on PLABWIN810
  • Perform Windows Host Enumeration using Rpcclient
  • Perform Linux Host Enumeration using Nmap
  • Enumerate Web Applications using Wafw00f
  • Enumerate a Web server using HTTPrint
  • Perform Website Enumeration using Nmap
  • Perform Server Message Block (SMB) Enumeration
  • Use Nikto for Vulnerability Scanning
  • Perform Vulnerability Scanning using OpenVAS
  • Use Lynis for System Vulnerability Scanning
  • Describe False Positive
  • Map Vulnerabilities
  • Prioritize Activities in Preparation for Penetration Test
  • Know about Exploits
  • Explain Cross-compiling Code
  • Explain Exploit Modification
  • Know about Exploit Chaining
  • Know about Proof-of-Concept Development (Exploit Development)
  • Know about Social Engineering

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
  • PT0-001: 2.3 Given a scenario, analyze vulnerability scan results
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Exploiting the Network Vulnerabilities

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Exploiting the Network Vulnerabilities
  • Review

Introduction

Penetration Testing

PenTest+

Slowris

MITM

ARP

Spoofing

DNS Spoofing

Denial-of-Service (DoS)

Sniffing

Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Exploiting the Network Vulnerabilities

After completing this lab, you will be able to:

  • Perform a Slowloris Attack on a Website
  • Conduct an Address Resolution Protocol (ARP) Poisoning Attack
  • Conduct Man-In-The-Middle Attacks using Ettercap
  • Track the Sniffing Network Interface Cards (NICs) on the Network
  • Perform DNS Spoofing Attack

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.2 Given a scenario, exploit network-based vulnerabilities

CompTIA PenTest+

Exploiting Desktop Systems Vulnerabilities

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Exploiting the Desktop Systems Vulnerabilities
  • Review

Introduction

Planning

Penetration Testing

PenTest+

Welcome to the Exploiting Desktop Systems Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Exploiting Desktop Systems Vulnerabilities

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Connect to a Windows Host and Launch the Exploit
  • Open the Meterpreter Shell
  • Extract and Crack the Password Hashes
  • Work with the Windows Commands
  • Enable a User Account
  • Handle Services
  • List the Existing User Accounts
  • Download a File from Windows System

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Exploit Web Application Vulnerabilities

Exercises

Introduction

Penetration Testing

PenTest+

Exploit

Web Application

Vulnerabilities

SQL Injection

Session

XSS

Welcome to the Exploit Web Application Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Exploit Web Application Vulnerabilities
  • Exercise 2 – Using Insecure Code Practices

After completing this lab, you will be able to:

  • Launch a SQL Injection Attack
  • Perform Broken Authentication Attacks
  • View Session ID in URL
  • Conduct OS Command Injection Attack
  • Perform Server-side Includes Injection Attack (SSI)
  • Perform Cross-site Scripting Attack
  • Performing Directory Traversal Attack
  • Perform Web Application Brute Forcing Using DirBuster
  • Know about Lack of Input Validation
  • Explain Hard-code Credentials
  • Know about Data in Cleartext Format
  • Know about Source Code Comments
  • Explain Verbose Errors
  • Know about Lack of Error Handling
  • Know about Lack of Code Signing
  • Explain the Occurrence of Race Conditions
  • Know about Hidden Elements – Sensitive Information in the DOM

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.4 Given a scenario, exploit application-based vulnerabilities

CompTIA PenTest+

Performing Password Attacks

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Performing Online Password Attacks
  • Exercise 2 – Performing Offline Password Attacks
  • Review

Introduction

Penetration Testing

PenTest+

Brute-Force Attack

Dictionary Attack

Rainbow Table

Cain

John the Reaper

Hydra

Welcome to the Performing Password Attacks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Performing Online Password Attacks
  • Exercise 2 – Performing Offline Password Attacks

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Use Wordlists
  • Use Hydra to Guess Usernames and Passwords
  • Crack Linux Passwords using John the Ripper
  • Sniff the Passwords
  • Capture NTLMv2 Hash through SMB
  • Use Responder
  • Generate Rainbow Tables
  • Recover Windows Hashes using Cain and Abel

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Exploiting Discovered Vulnerabilities

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Exploiting Discovered Vulnerabilities
  • Review

Introduction

Penetration Testing

PenTest+

Vulnerabilities

Lateral Movement

Pivoting

Backdoor

Welcome to the Exploiting Discovered Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Exploiting Discovered Vulnerabilities

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Perform Lateral Movement with Named Pipes
  • Create a Persistent Backdoor
  • Explain Pivoting

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 2.4 Explain the process of leveraging information to prepare for exploitation
  • PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
  • PT0-001: 4.2 Compare and contrast various use cases of tools

CompTIA PenTest+

Work with Various Tools

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1 – Work with Various Penetration Testing Tools
  • Review

CompTIA PenTest+

Work with Various Tools

Introduction

Introduction

Penetration Testing

PenTest+

Backdoor

Remote Desktop

Exploit

Impacket

Incognito

Searchsploit

Welcome to the Work with Various Tools Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Work with Various Penetration Testing Tools

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Start a Meterpreter Session on a Windows System
  • Create a Backdoor User
  • Enable Remote Desktop in Windows Firewall
  • Enable Remote Desktop Using Meterpreter
  • Use the Incognito Module
  • Work with Searchsploit
  • Work with Impacket

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 4.2 Compare and contrast various use cases of tools
  • PT0-001: 2.2 Given a scenario, perform a vulnerability scan

CompTIA PenTest+

Performing Physical Security

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Explain Physical Security Attacks Related to Facilities
  • Review

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Explain Physical Security Attacks Related to Facilities

After completing this lab, you will have covered the following topics:

  • Piggybacking/Tailgating
  • Fence Jumping
  • Dumpster Diving
  • Lock Picking
  • Lock Bypass
  • Egress Sensor

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.6 Summarize physical security attacks related to facilities

CompTIA PenTest+

Working with Scripts

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Work with Variables
  • Exercise 2 – Work with Loops
  • Exercise 3 – Use Error Handling and Arrays
  • Review

Introduction

Penetration Testing

PenTest+

Scripting

Variables

Global Variables

Shell Scripts

Arrays

Welcome to the Working with Scripts Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Work with Variables
  • Exercise 2 – Work with Loops
  • Exercise 3 – Use Error Handling and Arrays

After completing this lab, you will be able to:

  • Use Local and Global Variables
  • Write Bash Functions
  • Use the Set Command
  • Use For Loop
  • Use If…Else Statements
  • Use While loop
  • Use Error Handling
  • Use Arrays

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 4.4 Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)

CompTIA PenTest+

Complete Post Exploit Tasks

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Complete Post Exploitation Tasks
  • Review

Introduction

Penetration Testing

PenTest+

Meterpreter

Keylogger

Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Getting Started

If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Complete Post Exploitation Tasks

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Start a Meterpreter Session on a Windows System
  • Migrate Malicious Code to an Exploited Windows Host
  • Start a Keylogger
  • Capture Screenshots
  • Perform Privilege Escalation
  • Search for Files
  • Enable Remote Desktop
  • Find the Installed Applications
  • Perform an ARP Scan
  • Clear Tracks

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.7 Given a scenario, perform post-exploitation techniques

CompTIA PenTest+

Analyzing and Reporting the Pen Test Results

Exercises

  • Introduction
  • Lab Topology
  • Exercise 1- Analyzing the Pen Test Data
  • Exercise 2 – Develop Recommendations for Mitigation Strategies
  • Exercise 3 – Write and Handle Reports
  • Exercise 4 – Conduct Post-Report Delivery Activities
  • Review
  • Welcome to the Analyzing and Reporting the Pen Test Results Practice Lab. In this module, you will be provided with the information needed to develop your knowledge.

·         Getting Started

  • If this is your first time using Practice Labs, please watch our Getting Started video below.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 – Guidance on Analyzing the Pen Test Data
  • Exercise 2 – Develop Recommendations for Mitigation Strategies
  • Exercise 3 – Write and Handle Reports
  • Exercise 4 – Conduct Post-Report-Delivery Activities

After completing this lab, you will have covered the following topics:

  • Perform Pen Test Data Collection
  • Perform Pen Test Data Categorization
  • Prioritize the Results
  • Suggest Solutions regarding People, Processes, and Technology
  • Create Categories of Findings
  • Conduct End-user Training
  • Password Encryption and Hashing
  • Multi-factor Authentication
  • Input Sanitization
  • System Hardening
  • Data Normalization
  • Report Structure
  • Report Storage, Handling, and Disposition
  • Post-Engagement Cleanup Tasks
  • Removal of Credentials
  • Removal of Various Tools
  • Client Acceptance
  • Attestation of Findings
  • Lesson Learned
  • Follow-up Actions

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 5.1 Given a scenario, use report writing and handling best practices
  • PT0-001: 5.2 Explain post-report delivery activities
  • PT0-001: 5.3 Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • PT0-001: 5.4 Explain the importance of communication during the penetration testing process.

Trả lời

Please log in using one of these methods to post your comment:

WordPress.com Logo

Bạn đang bình luận bằng tài khoản WordPress.com Đăng xuất /  Thay đổi )

Google photo

Bạn đang bình luận bằng tài khoản Google Đăng xuất /  Thay đổi )

Twitter picture

Bạn đang bình luận bằng tài khoản Twitter Đăng xuất /  Thay đổi )

Facebook photo

Bạn đang bình luận bằng tài khoản Facebook Đăng xuất /  Thay đổi )

Connecting to %s