CompTIA Pentest+ PT0-002 – Section 21: Scripting Basics Part 1
March 18, 2023

200. Scripting Basics (OBJ 5.1 & OBJ 5.2) In this section of the course we’re going to talk about the basics of scripting and how you can create your own scripts during your penetration tests and engagements to automate some or all of your workflow. This topic is really focused on domain five tools and […]

CompTIA Pentest+ PT0-002 – Section 20: Post-report Activities Part 3
March 17, 2023

198. Lessons Learned (OBJ 4.2) In this lesson, we’re going to talk about Lessons Learned, which is a key part of your post-report delivery activities. Now, Lessons Learned are an analysis of the events that can provide us insight into how we can improve our penetration testing process in the future. The Lessons Learned process […]

CompTIA Pentest+ PT0-002 – Section 20: Post-report Activities Part 2
March 17, 2023

195. Destroy Test Data (OBJ 4.2) In this lesson, we’re going to talk about how you destroy your test data. Now when I’m talking about test data, I’m talking about all the things you’ve collected during this engagement. As you’ve been going through and doing password cracking, as you’ve been going through and doing hash […]

CompTIA Pentest+ PT0-002 – Section 20: Post-report Activities Part 1
March 16, 2023

192. Post-report Activities (OBJ 4.2) In this section of the course, we’re going to discuss the different actions that you need to perform after your report has been completed and delivered to your client. As we move through this section, we’re going to continue looking at the fourth phase of our engagement, reporting and communication. […]

CompTIA Pentest+ PT0-002 – Section 19: Findings and Remediations Part 4
March 16, 2023

187. Secure Coding (OBJ 4.2) Secure Coding. In this lesson, we are going to talk about some secure coding best practices. And in this lesson, we’re going to talk about input validation, output encoding, and parametrized queries. First, let’s talk about input validation. Now I know I’ve mentioned how important it is when I talked […]

CompTIA Pentest+ PT0-002 – Section 19: Findings and Remediations Part 3
March 15, 2023

185. Administrative Controls (OBJ 4.2) In this lesson, we’re going to talk about some administrative controls. This includes role-based access control, minimum password requirements, policies and procedures, and secure software development life cycles. First, we have role-based access control. Role-based access control is a security approach that focuses on restricting the availability of a resource […]

CompTIA Pentest+ PT0-002 – Section 19: Findings and Remediations Part 2
March 15, 2023

183. Physical Controls (OBJ 4.2) In this lesson, we’re going to talk about some physical security controls that you can use as remediation against vulnerabilities found during your penetration tests. Often, you’re going to find that physical access is a lot easier to achieve than getting remote access, because a lot of organizations will fall […]

CompTIA Pentest+ PT0-002 – Section 19: Findings and Remediations Part 1
March 14, 2023

180. Findings and Remediations (OBJ 4.2) In this section of the course, we’re going to discuss how to make recommendations for appropriate remediations based on the findings that you found during your penetration test. As we move into this section, we’re going to be continuing to look at the fourth phase of our engagement, reporting […]

CompTIA Pentest+ PT0-002 – Section 18: Communication and Reports Part 3
March 14, 2023

176. Report Data Gathering (OBJ 4.1) In this lesson, we’re going to discuss how you gather data for the report at the end of your engagement. Now, data can come from numerous different sources including your open source intelligence, reconnaissance, enumeration, vulnerability scanners, and your attack and exploit tools. As you conduct your engagements, you […]

CompTIA Pentest+ PT0-002 – Section 18: Communication and Reports Part 2
March 13, 2023

174. Reasons for Communication (OBJ 4.3) In this lesson, we’re going to discuss the different reasons for communication during a penetration test or engagement. These reasons include situational awareness, de-confliction, de-escalation, identifying false positives, criminal activity, and goal reprioritization. The first reason that a penetration tester needs to communicate with the target organization, is to […]

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!