Training Video Course

PT0-002: CompTIA PenTest+ Certification Exam

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The PT0-002 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA PT0-002 test with flying colors.

Rating
4.52rating
Students
136
Duration
07:10:14 h
$16.49
$14.99

Curriculum for PT0-002 Certification Video Course

Name of Video Time
Play Video: Planning an Engagement (OBJ 1.1, 1.2, and 1.3)
1. Planning an Engagement (OBJ 1.1, 1.2, and 1.3)
2:26
Play Video: Risk (OBJ 1.2)
2. Risk (OBJ 1.2)
9:11
Play Video: Risk Handling (OBJ 1.2)
3. Risk Handling (OBJ 1.2)
7:52
Play Video: Controls (OBJ 1.2)
4. Controls (OBJ 1.2)
7:30
Play Video: PenTest Methodologies (OBJ 1.2)
5. PenTest Methodologies (OBJ 1.2)
7:55
Play Video: PenTest Standards (OBJ 1.2)
6. PenTest Standards (OBJ 1.2)
7:06
Play Video: Planning a Test (OBJ 1.2)
7. Planning a Test (OBJ 1.2)
9:39
Play Video: Legal Concepts (OBJ 1.1)
8. Legal Concepts (OBJ 1.1)
8:20
Play Video: Regulatory Compliance (OBJ 1.1)
9. Regulatory Compliance (OBJ 1.1)
15:16
Play Video: Professionalism (OBJ 1.3)
10. Professionalism (OBJ 1.3)
10:31
Name of Video Time
Play Video: Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)
1. Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)
3:35
Play Video: Defining the Scope (OBJ 1.2)
2. Defining the Scope (OBJ 1.2)
6:57
Play Video: Adversary Emulation (OBJ 1.2)
3. Adversary Emulation (OBJ 1.2)
11:54
Play Video: Target List (OBJ 1.2)
4. Target List (OBJ 1.2)
10:56
Play Video: Identifying Restrictions (OBJ 1.1)
5. Identifying Restrictions (OBJ 1.1)
8:01
Play Video: Rules of Engagement (OBJ 1.2)
6. Rules of Engagement (OBJ 1.2)
7:45
Play Video: Assessment Types (OBJ 1.3)
7. Assessment Types (OBJ 1.3)
8:59
Play Video: Validating the Scope (OBJ 1.2)
8. Validating the Scope (OBJ 1.2)
5:17
Play Video: Limitations and Permission (OBJ 1.1 and 1.3)
9. Limitations and Permission (OBJ 1.1 and 1.3)
6:57
Play Video: Build a Virtual Lab
10. Build a Virtual Lab
16:39
Name of Video Time
Play Video: Passive Reconnaissance (OBJ 2.1)
1. Passive Reconnaissance (OBJ 2.1)
2:39
Play Video: Information Gathering (OBJ 2.1)
2. Information Gathering (OBJ 2.1)
5:57
Play Video: Open-Source Intelligence (OSINT) (OBJ 2.1)
3. Open-Source Intelligence (OSINT) (OBJ 2.1)
5:36
Play Video: Social Media Scraping (OBJ 2.1)
4. Social Media Scraping (OBJ 2.1)
2:29
Play Video: OSINT Tools (OBJ 2.1)
5. OSINT Tools (OBJ 2.1)
11:43
Play Video: Using OSINT Tools (OBJ 2.1)
6. Using OSINT Tools (OBJ 2.1)
26:35
Play Video: DNS Information (OBJ 2.1)
7. DNS Information (OBJ 2.1)
9:04
Play Video: Reconnaissance with CentralOps (OBJ 2.1)
8. Reconnaissance with CentralOps (OBJ 2.1)
13:05
Play Video: Public Repositories (OBJ2.1)
9. Public Repositories (OBJ2.1)
4:40
Play Video: Search Engine Analysis (OBJ 2.1)
10. Search Engine Analysis (OBJ 2.1)
6:21
Play Video: URL Analysis (OBJ 2.1)
11. URL Analysis (OBJ 2.1)
15:20
Play Video: Cryptographic Flaws (OBJ 2.1)
12. Cryptographic Flaws (OBJ 2.1)
16:31
Play Video: CWE & CVE (OBJ 2.1)
13. CWE & CVE (OBJ 2.1)
6:24
Name of Video Time
Play Video: Active Reconnaissance (OBJ 2.2 and 2.3)
1. Active Reconnaissance (OBJ 2.2 and 2.3)
2:19
Play Video: Scanning and Enumeration (OBJ 2.2 and 2.3)
2. Scanning and Enumeration (OBJ 2.2 and 2.3)
10:07
Play Video: Conducting Enumeration (OBJ 2.3)
3. Conducting Enumeration (OBJ 2.3)
14:57
Play Video: Other Enumeration (OBJ 2.2 and 2.3)
4. Other Enumeration (OBJ 2.2 and 2.3)
9:24
Play Video: Website Reconnaissance (OBJ 2.3)
5. Website Reconnaissance (OBJ 2.3)
8:45
Play Video: Detecting and Evading Defenses (OBJ 2.2)
6. Detecting and Evading Defenses (OBJ 2.2)
9:47
Play Video: Packet Crafting (OBJ 2.2)
7. Packet Crafting (OBJ 2.2)
10:29
Play Video: Eavesdropping (OBJ 2.2)
8. Eavesdropping (OBJ 2.2)
10:15
Play Video: Wardriving (OBJ 2.2)
9. Wardriving (OBJ 2.2)
8:17
Play Video: DNS and ARP Analysis (OBJ 2.3)
10. DNS and ARP Analysis (OBJ 2.3)
23:00
Play Video: Network Traffic Analysis (OBJ 2.3)
11. Network Traffic Analysis (OBJ 2.3)
17:53
Name of Video Time
Play Video: Vulnerability Scanning (OBJ 2.3 and 2.4)
1. Vulnerability Scanning (OBJ 2.3 and 2.4)
1:57
Play Video: Vulnerability Lifecycle (OBJ 2.3 and 2.4)
2. Vulnerability Lifecycle (OBJ 2.3 and 2.4)
8:36
Play Video: Vulnerability Scans (OBJ 2.3 and 2.4)
3. Vulnerability Scans (OBJ 2.3 and 2.4)
11:10
Play Video: Scanning Considerations (OBJ 2.3 and 2.4)
4. Scanning Considerations (OBJ 2.3 and 2.4)
9:22
Play Video: Nessus Scanning (OBJ 2.3 and 2.4)
5. Nessus Scanning (OBJ 2.3 and 2.4)
9:09
Play Video: OpenVas Scanning (OBJ 2.3 and 2.4)
6. OpenVas Scanning (OBJ 2.3 and 2.4)
13:35
Play Video: Nikto Scanning (OBJ 2.3 and 2.4)
7. Nikto Scanning (OBJ 2.3 and 2.4)
5:19
Name of Video Time
Play Video: Nmap (OBJ 2.3 and 2.4)
1. Nmap (OBJ 2.3 and 2.4)
2:31
Play Video: Nmap Discovery Scans (OBJ 2.3 and 2.4)
2. Nmap Discovery Scans (OBJ 2.3 and 2.4)
7:54
Play Video: Nmap Port Scans (OBJ 2.3 and 2.4)
3. Nmap Port Scans (OBJ 2.3 and 2.4)
9:13
Play Video: Nmap Fingerprinting (OBJ 2.3 and 2.4)
4. Nmap Fingerprinting (OBJ 2.3 and 2.4)
4:13
Play Video: Using Nmap (OBJ 2.3 and 2.4)
5. Using Nmap (OBJ 2.3 and 2.4)
11:32
Play Video: Nmap Scripting Engine (OBJ 2.3 and 2.4)
6. Nmap Scripting Engine (OBJ 2.3 and 2.4)
20:21
Name of Video Time
Play Video: Social Engineering and Physical Attacks (OBJ 3.6)
1. Social Engineering and Physical Attacks (OBJ 3.6)
3:36
Play Video: Methods of Influence (OBJ 3.6)
2. Methods of Influence (OBJ 3.6)
11:11
Play Video: Social Engineering (OBJ 3.6)
3. Social Engineering (OBJ 3.6)
14:00
Play Video: Phishing Campaigns (OBJ 3.6)
4. Phishing Campaigns (OBJ 3.6)
5:14
Play Video: Social Engineering Toolkit (OBJ 3.6)
5. Social Engineering Toolkit (OBJ 3.6)
13:38
Play Video: Pretexting (OBJ 3.6)
6. Pretexting (OBJ 3.6)
4:08
Play Video: Baiting Victims (OBJ 3.6)
7. Baiting Victims (OBJ 3.6)
5:49
Play Video: Impersonation (OBJ 3.6)
8. Impersonation (OBJ 3.6)
4:17
Play Video: Physical Security (OBJ 3.6)
9. Physical Security (OBJ 3.6)
15:43
Play Video: Lock Picking (OBJ 3.6)
10. Lock Picking (OBJ 3.6)
1:37
Play Video: Physical Attacks (OBJ 3.6)
11. Physical Attacks (OBJ 3.6)
10:25
Play Video: Social Engineering Tools (OBJ 3.6)
12. Social Engineering Tools (OBJ 3.6)
4:15
Name of Video Time
Play Video: Wireless Attacks (OBJ 3.2)
1. Wireless Attacks (OBJ 3.2)
3:24
Play Video: Wireless Security (OBJ 3.2)
2. Wireless Security (OBJ 3.2)
16:38
Play Video: Bypassing MAC Filtering (OBJ 3.2)
3. Bypassing MAC Filtering (OBJ 3.2)
4:08
Play Video: Signal Exploitation (OBJ 3.2)
4. Signal Exploitation (OBJ 3.2)
11:16
Play Video: WEP Hacking (OBJ 3.2)
5. WEP Hacking (OBJ 3.2)
9:22
Play Video: WPA/WPA2 Hacking (OBJ 3.2)
6. WPA/WPA2 Hacking (OBJ 3.2)
8:37
Play Video: WPS PIN Attacks (OBJ 3.2)
7. WPS PIN Attacks (OBJ 3.2)
11:45
Play Video: Evil Twins (OBJ 3.2)
8. Evil Twins (OBJ 3.2)
5:53
Play Video: On-path and Relay Attacks (OBJ 3.2)
9. On-path and Relay Attacks (OBJ 3.2)
4:47
Play Video: Bluetooth Attacks (OBJ 3.2)
10. Bluetooth Attacks (OBJ 3.2)
5:50
Play Video: RFID and NFC Attacks (OBJ 3.2)
11. RFID and NFC Attacks (OBJ 3.2)
4:46
Name of Video Time
Play Video: Network Attacks (OBJ 3.1)
1. Network Attacks (OBJ 3.1)
2:30
Play Video: Stress Testing (OBJ 3.1)
2. Stress Testing (OBJ 3.1)
6:33
Play Video: Exploit Resources (OBJ 3.1)
3. Exploit Resources (OBJ 3.1)
6:23
Play Video: ARP Poisoning (OBJ 3.1)
4. ARP Poisoning (OBJ 3.1)
7:17
Play Video: DNS Cache Poisoning (OBJ 3.1)
5. DNS Cache Poisoning (OBJ 3.1)
12:37
Play Video: LLMNR/NBT-NS Poisoning (OBJ 3.1)
6. LLMNR/NBT-NS Poisoning (OBJ 3.1)
4:50
Play Video: MAC Spoofing (OBJ 3.1)
7. MAC Spoofing (OBJ 3.1)
5:23
Play Video: VLAN Hopping (OBJ 3.1)
8. VLAN Hopping (OBJ 3.1)
6:56
Play Video: NAC Bypass (OBJ 3.1)
9. NAC Bypass (OBJ 3.1)
4:51
Play Video: On-path Attack (OBJ 3.1)
10. On-path Attack (OBJ 3.1)
3:58
Play Video: Password Attacks (OBJ 3.1)
11. Password Attacks (OBJ 3.1)
10:09
Play Video: Pass the Hash (OBJ 3.1)
12. Pass the Hash (OBJ 3.1)
7:55
Play Video: Intro to Metasploit (OBJ 3.1)
13. Intro to Metasploit (OBJ 3.1)
18:53
Play Video: Netcat (OBJ 3.1)
14. Netcat (OBJ 3.1)
7:41
Play Video: Using Netcat (OBJ 3.1)
15. Using Netcat (OBJ 3.1)
10:59
Name of Video Time
Play Video: Application Vulnerabilities (OBJ 3.3)
1. Application Vulnerabilities (OBJ 3.3)
5:43
Play Video: Race Conditions (OBJ 3.3)
2. Race Conditions (OBJ 3.3)
4:55
Play Video: Buffer Overflows (OBJ 3.3)
3. Buffer Overflows (OBJ 3.3)
12:23
Play Video: Buffer Overflow Attacks (OBJ 3.3)
4. Buffer Overflow Attacks (OBJ 3.3)
6:25
Play Video: Authentication and References (OBJ 3.3)
5. Authentication and References (OBJ 3.3)
4:44
Play Video: Improper Error Handling (OBJ 3.3)
6. Improper Error Handling (OBJ 3.3)
5:11
Play Video: Improper Headers (OBJ 3.3)
7. Improper Headers (OBJ 3.3)
6:06
Play Video: Code Signing (OBJ 3.3)
8. Code Signing (OBJ 3.3)
1:56
Play Video: Vulnerable Components (OBJ 3.3)
9. Vulnerable Components (OBJ 3.3)
11:42
Play Video: Software Composition (OBJ 3.3)
10. Software Composition (OBJ 3.3)
9:46
Play Video: Privilege Escalation (OBJ 3.3)
11. Privilege Escalation (OBJ 3.3)
6:09
Play Video: Conducting Privilege Escalation (OBJ 3.3)
12. Conducting Privilege Escalation (OBJ 3.3)
13:06
Name of Video Time
Play Video: Application Attacks (OBJ 3.3)
1. Application Attacks (OBJ 3.3)
2:36
Play Video: Directory Traversals (OBJ 3.3)
2. Directory Traversals (OBJ 3.3)
9:32
Play Video: Dirbuster (OBJ 3.3)
3. Dirbuster (OBJ 3.3)
7:15
Play Video: Cross-Site Scripting (XSS) (OBJ 3.3)
4. Cross-Site Scripting (XSS) (OBJ 3.3)
8:56
Play Video: Cross-Site Request Forgery (CSRF) (OBJ 3.3)
5. Cross-Site Request Forgery (CSRF) (OBJ 3.3)
7:10
Play Video: SQL Injections (OBJ 3.3)
6. SQL Injections (OBJ 3.3)
6:58
Play Video: Conducting SQL Injections (OBJ 3.3)
7. Conducting SQL Injections (OBJ 3.3)
8:26
Play Video: Burp Suite and SQLmap (OBJ 3.3)
8. Burp Suite and SQLmap (OBJ 3.3)
10:06
Play Video: OWASP ZAP (OBJ 3.3)
9. OWASP ZAP (OBJ 3.3)
2:49
Play Video: XML Injections (OBJ 3.3)
10. XML Injections (OBJ 3.3)
6:20
Play Video: Other Injection Attacks (OBJ 3.3)
11. Other Injection Attacks (OBJ 3.3)
3:21
Play Video: Attacking Web Applications (OBJ 3.3)
12. Attacking Web Applications (OBJ 3.3)
15:36
Name of Video Time
Play Video: Cloud Attacks (OBJ 3.4)
1. Cloud Attacks (OBJ 3.4)
2:08
Play Video: Attacking the Cloud (OBJ 3.4)
2. Attacking the Cloud (OBJ 3.4)
6:54
Play Video: Credential Harvesting (OBJ 3.4)
3. Credential Harvesting (OBJ 3.4)
8:17
Play Video: Misconfigured Assets (OBJ 3.4)
4. Misconfigured Assets (OBJ 3.4)
12:12
Play Video: Metadata Service Attack (OBJ 3.4)
5. Metadata Service Attack (OBJ 3.4)
4:32
Play Video: Software Development Kit (SDK) (OBJ 3.4)
6. Software Development Kit (SDK) (OBJ 3.4)
2:55
Play Video: Auditing the Cloud (OBJ 3.4)
7. Auditing the Cloud (OBJ 3.4)
5:04
Play Video: Conducting Cloud Audits (OBJ 3.4)
8. Conducting Cloud Audits (OBJ 3.4)
13:59
Name of Video Time
Play Video: Attacks on Mobile Devices (OBJ 3.5)
1. Attacks on Mobile Devices (OBJ 3.5)
4:46
Play Video: Enterprise Mobility Management (OBJ 3.5)
2. Enterprise Mobility Management (OBJ 3.5)
9:32
Play Video: Deployment Options (OBJ 3.5)
3. Deployment Options (OBJ 3.5)
4:34
Play Video: Mobile Reconnaissance Concerns (OBJ 3.5)
4. Mobile Reconnaissance Concerns (OBJ 3.5)
7:57
Play Video: Mobile Device Insecurity (OBJ 3.5)
5. Mobile Device Insecurity (OBJ 3.5)
12:15
Play Video: Multifactor Authentication (OBJ 3.5)
6. Multifactor Authentication (OBJ 3.5)
12:11
Play Video: Mobile Device Attacks (OBJ 3.5)
7. Mobile Device Attacks (OBJ 3.5)
5:14
Play Video: Malware Analysis (OBJ 3.5)
8. Malware Analysis (OBJ 3.5)
13:13
Play Video: Conducting Malware Analysis (OBJ 3.5)
9. Conducting Malware Analysis (OBJ 3.5)
25:55
Play Video: Mobile Device Tools (OBJ 3.5)
10. Mobile Device Tools (OBJ 3.5)
8:21
Name of Video Time
Play Video: Attacks on Specialized Systems (OBJ 3.5)
1. Attacks on Specialized Systems (OBJ 3.5)
2:44
Play Video: Internet of Things (IoT) Devices (OBJ 3.5)
2. Internet of Things (IoT) Devices (OBJ 3.5)
8:17
Play Video: Internet of Things (IoT) Vulnerabilities (OBJ 3.5)
3. Internet of Things (IoT) Vulnerabilities (OBJ 3.5)
7:35
Play Video: Embedded Systems (OBJ 3.5)
4. Embedded Systems (OBJ 3.5)
6:45
Play Video: ICS and SCADA Devices (OBJ 3.5)
5. ICS and SCADA Devices (OBJ 3.5)
9:16
Play Video: ICS Protocols and Vulnerabilities (OBJ 3.5)
6. ICS Protocols and Vulnerabilities (OBJ 3.5)
10:51
Play Video: Data Storage Vulnerabilities (OBJ 3.5)
7. Data Storage Vulnerabilities (OBJ 3.5)
5:58
Play Video: Virtual Environments (OBJ 3.5)
8. Virtual Environments (OBJ 3.5)
8:16
Play Video: Virtual Machine Attacks (OBJ 3.5)
9. Virtual Machine Attacks (OBJ 3.5)
5:56
Play Video: Containerization (OBJ 3.5
10. Containerization (OBJ 3.5
5:45
Name of Video Time
Play Video: Post-exploitation (OBJ 3.7)
1. Post-exploitation (OBJ 3.7)
2:51
Play Video: Enumerating the Network (OBJ 3.7)
2. Enumerating the Network (OBJ 3.7)
4:04
Play Video: Network Segmentation Testing (OBJ 3.7)
3. Network Segmentation Testing (OBJ 3.7)
3:10
Play Video: Lateral Movement and Pivoting (OBJ 3.7)
4. Lateral Movement and Pivoting (OBJ 3.7)
2:58
Play Video: Pass the Hash (OBJ 3.7)
5. Pass the Hash (OBJ 3.7)
7:49
Play Video: Golden Ticket (OBJ 3.7)
6. Golden Ticket (OBJ 3.7)
6:05
Play Video: Lateral Movement (OBJ 3.7)
7. Lateral Movement (OBJ 3.7)
8:31
Play Video: Pivoting (3.7)
8. Pivoting (3.7)
7:42
Play Video: Escalating Privileges (OBJ 3.7)
9. Escalating Privileges (OBJ 3.7)
19:14
Play Video: Upgrading Restrictive Shells (OBJ 3.7)
10. Upgrading Restrictive Shells (OBJ 3.7)
5:26
Name of Video Time
Play Video: Detection Avoidance (OBJ 3.7)
1. Detection Avoidance (OBJ 3.7)
1:31
Play Video: Trojans and Backdoors (OBJ 3.7)
2. Trojans and Backdoors (OBJ 3.7)
4:20
Play Video: Creating Persistence (OBJ 3.7)
3. Creating Persistence (OBJ 3.7)
13:51
Play Video: Living Off the Land (OBJ 3.7)
4. Living Off the Land (OBJ 3.7)
12:01
Play Video: Data Exfiltration (OBJ 3.7)
5. Data Exfiltration (OBJ 3.7)
6:46
Play Video: Covert Channels (OBJ 3.7)
6. Covert Channels (OBJ 3.7)
4:44
Play Video: Steganography (3.7)
7. Steganography (3.7)
2:58
Play Video: Covering Your Tracks (OBJ 3.7)
8. Covering Your Tracks (OBJ 3.7)
10:03
Play Video: Persistence and Covering Your Tracks (OBJ 3.7)
9. Persistence and Covering Your Tracks (OBJ 3.7)
8:44
Play Video: Post-Exploitation Tools (OBJ 3.7)
10. Post-Exploitation Tools (OBJ 3.7)
3:00
Name of Video Time
Play Video: Communication and Reports (OBJ 4.3)
1. Communication and Reports (OBJ 4.3)
1:44
Play Video: Communication Paths (OBJ 4.3)
2. Communication Paths (OBJ 4.3)
5:25
Play Video: Communication Triggers (OBJ 4.3)
3. Communication Triggers (OBJ 4.3)
4:36
Play Video: Reasons for Communication (OBJ 4.3)
4. Reasons for Communication (OBJ 4.3)
10:18
Play Video: Presentation of Findings (4.1 & OBJ 4.3)
5. Presentation of Findings (4.1 & OBJ 4.3)
6:05
Play Video: Report Data Gathering (OBJ 4.1)
6. Report Data Gathering (OBJ 4.1)
3:38
Play Video: Written Reports (OBJ 4.1)
7. Written Reports (OBJ 4.1)
14:44
Play Video: Common Themes (OBJ 4.1)
8. Common Themes (OBJ 4.1)
3:01
Play Video: Securing and Storing Reports (OBJ 4.1)
9. Securing and Storing Reports (OBJ 4.1)
5:06
Name of Video Time
Play Video: Findings and Remediations (OBJ 4.2)
1. Findings and Remediations (OBJ 4.2)
2:32
Play Video: Security Control Categories (OBJ 4.2)
2. Security Control Categories (OBJ 4.2)
13:35
Play Video: Selecting Security Controls (OBJ 4.2)
3. Selecting Security Controls (OBJ 4.2)
3:56
Play Video: Physical Controls (OBJ 4.2)
4. Physical Controls (OBJ 4.2)
6:55
Play Video: Operational Controls (OBJ 4.2)
5. Operational Controls (OBJ 4.2)
10:22
Play Video: Administrative Controls (OBJ 4.2)
6. Administrative Controls (OBJ 4.2)
14:23
Play Video: System Hardening (OBJ 4.2)
7. System Hardening (OBJ 4.2)
10:55
Play Video: Secure Coding (OBJ 4.2)
8. Secure Coding (OBJ 4.2)
8:19
Play Video: Implementing MFA (OBJ 4.2)
9. Implementing MFA (OBJ 4.2)
6:21
Play Video: Digital Certificates (OBJ 4.2)
10. Digital Certificates (OBJ 4.2)
9:47
Play Video: Other Technical Controls (OBJ 4.2)
11. Other Technical Controls (OBJ 4.2)
2:41
Play Video: Mitigation Strategies (OBJ 4.2)
12. Mitigation Strategies (OBJ 4.2)
8:07
Name of Video Time
Play Video: Post-report Activities (OBJ 4.2)
1. Post-report Activities (OBJ 4.2)
2:42
Play Video: Removing Shells and Tools (OBJ 4.2)
2. Removing Shells and Tools (OBJ 4.2)
2:53
Play Video: Deleting Test Credentials (OBJ 4.2)
3. Deleting Test Credentials (OBJ 4.2)
1:53
Play Video: Destroy Test Data (OBJ 4.2)
4. Destroy Test Data (OBJ 4.2)
2:51
Play Video: Client Acceptance (OBJ 4.2)
5. Client Acceptance (OBJ 4.2)
2:57
Play Video: Attestation of Findings (OBJ 4.2)
6. Attestation of Findings (OBJ 4.2)
3:00
Play Video: Lessons Learned (OBJ 4.2)
7. Lessons Learned (OBJ 4.2)
4:04
Play Video: Retesting (OBJ 4.2)
8. Retesting (OBJ 4.2)
2:42
Name of Video Time
Play Video: Scripting Basics (OBJ 5.1 & OBJ 5.2)
1. Scripting Basics (OBJ 5.1 & OBJ 5.2)
2:24
Play Video: Scripting Tools (OBJ 5.2)
2. Scripting Tools (OBJ 5.2)
9:50
Play Video: Variables (OBJ 5.1)
3. Variables (OBJ 5.1)
7:52
Play Video: Loops (OBJ 5.1)
4. Loops (OBJ 5.1)
5:20
Play Video: Logic Control (OBJ 5.1)
5. Logic Control (OBJ 5.1)
4:35
Play Video: Data Structures (OBJ 5.1)
6. Data Structures (OBJ 5.1)
12:40
Play Video: Object Oriented Programming (OBJ 5.1)
7. Object Oriented Programming (OBJ 5.1)
6:59
Name of Video Time
Play Video: Analyzing Scripts (OBJ 5.2)
1. Analyzing Scripts (OBJ 5.2)
5:18
Play Video: Coding in Bash (OBJ 5.2)
2. Coding in Bash (OBJ 5.2)
21:17
Play Video: Bash Example (OBJ 5.2)
3. Bash Example (OBJ 5.2)
4:35
Play Video: Coding in PowerShell (OBJ 5.2)
4. Coding in PowerShell (OBJ 5.2)
15:41
Play Video: PowerShell Example (OBJ 5.2)
5. PowerShell Example (OBJ 5.2)
3:25
Play Video: Coding in Python (OBJ 5.2)
6. Coding in Python (OBJ 5.2)
19:52
Play Video: Python Example (OBJ 5.2)
7. Python Example (OBJ 5.2)
3:40
Play Video: Coding in Perl (OBJ 5.2)
8. Coding in Perl (OBJ 5.2)
17:24
Play Video: Perl Example (OBJ 5.2)
9. Perl Example (OBJ 5.2)
16:11
Play Video: Coding in JavaScript (OBJ 5.2)
10. Coding in JavaScript (OBJ 5.2)
19:22
Play Video: JavaScript Example (OBJ 5.2)
11. JavaScript Example (OBJ 5.2)
9:48
Play Video: Coding in Ruby (OBJ 5.2)
12. Coding in Ruby (OBJ 5.2)
13:43
Play Video: Ruby Example (OBJ 5.2)
13. Ruby Example (OBJ 5.2)
4:15
Name of Video Time
Play Video: Exploits and Automation (OBJ 5.2)
1. Exploits and Automation (OBJ 5.2)
1:37
Play Video: Exploits to Download Files (OBJ 5.2)
2. Exploits to Download Files (OBJ 5.2)
4:27
Play Video: Exploits for Remote Access (OBJ 5.2)
3. Exploits for Remote Access (OBJ 5.2)
9:26
Play Video: Exploits for Enumerating Users (OBJ 5.2)
4. Exploits for Enumerating Users (OBJ 5.2)
5:57
Play Video: Exploits for Enumerating Assets (OBJ 5.2)
5. Exploits for Enumerating Assets (OBJ 5.2)
5:24
Play Video: Automation in Engagements (OBJ 5.2)
6. Automation in Engagements (OBJ 5.2)
3:28
Play Video: Automation with Nmap Scripts (OBJ 5.2)
7. Automation with Nmap Scripts (OBJ 5.2)
2:35
Name of Video Time
Play Video: Tool Round-up (OBJ 5.3)
1. Tool Round-up (OBJ 5.3)
2:54
Play Video: OSINT Tools (OBJ 5.3)
2. OSINT Tools (OBJ 5.3)
6:14
Play Video: Scanning Tools (OBJ 5.3)
3. Scanning Tools (OBJ 5.3)
6:40
Play Video: Networking Tools (OBJ 5.3)
4. Networking Tools (OBJ 5.3)
2:31
Play Video: Wireless Tools (OBJ 5.3)
5. Wireless Tools (OBJ 5.3)
7:37
Play Video: Social Engineering Tools (OBJ 5.3)
6. Social Engineering Tools (OBJ 5.3)
2:36
Play Video: Remote Access Tools (OBJ 5.3)
7. Remote Access Tools (OBJ 5.3)
4:24
Play Video: Credential Testing Tools (OBJ 5.3)
8. Credential Testing Tools (OBJ 5.3)
7:39
Play Video: Web Application Tools (OBJ 5.3)
9. Web Application Tools (OBJ 5.3)
2:26
Play Video: Cloud Tools (OBJ 5.3)
10. Cloud Tools (OBJ 5.3)
2:59
Play Video: Steganography Tools (OBJ 5.3)
11. Steganography Tools (OBJ 5.3)
6:35
Play Video: Debuggers (OBJ 5.3)
12. Debuggers (OBJ 5.3)
5:32
Play Video: Miscellaneous Tools (OBJ 5.3)
13. Miscellaneous Tools (OBJ 5.3)
9:27
Name of Video Time
Play Video: Conclusion
1. Conclusion
9:13

CompTIA PT0-002 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA PT0-002 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA PT0-002 Premium Bundle
$69.97
$49.99

PT0-002 Premium Bundle

  • Premium File: 326 Questions & Answers. Last update: Apr 20, 2024
  • Training Course: 237 Video Lectures
  • Study Guide: 795 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

PT0-002 Premium Bundle

CompTIA PT0-002 Premium Bundle
  • Premium File: 326 Questions & Answers. Last update: Apr 20, 2024
  • Training Course: 237 Video Lectures
  • Study Guide: 795 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free PT0-002 Exam Questions & PT0-002 Dumps

File Name Size Votes
File Name
comptia.examcollection.pt0-002.v2024-02-17.by.oliver.32q.vce
Size
2.42 MB
Votes
1
File Name
comptia.prep4sure.pt0-002.v2021-12-09.by.imogen.40q.vce
Size
1.65 MB
Votes
1

CompTIA PT0-002 Training Course

Want verified and proven knowledge for CompTIA PenTest+ Certification Exam? Believe it's easy when you have ExamSnap's CompTIA PenTest+ Certification Exam certification video training course by your side which along with our CompTIA PT0-002 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA PenTest+ Certification Exam certification video training course that goes in line with the corresponding CompTIA PT0-002 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about PT0-002 Exams. Don't share your email address asking for PT0-002 braindumps or PT0-002 exam pdf files.

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.