$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Closed Captions
Certificate of Completion
A Pentester, or Penetration Tester, is a professional skilled in assessing and improving the security of computer systems and networks by simulating cyber attacks. Their role is critical in identifying vulnerabilities and ensuring that an organization’s digital assets are secure from potential threats. Key responsibilities and skills of a Pentester include:
In summary, a Pentester plays a vital role in safeguarding an organization’s digital infrastructure, employing a mix of technical expertise, strategic thinking, and continuous learning to identify and mitigate security risks.
Module 1 - CompTIA Cloud+ CV0-003 Course Overview
1.0 Course Trailer
1.1 Course Overview
1.2 What is the Cloud + Exam
1.3 Cloud + Domain Obectives Overview
1.4 CompTIA Certification Pathways
1.5 DoD and ISO Requirements
Module 2 - General Cloud Knowledge
2.1 Domain Overview
2.2 Compare and Contrast Cloud Models
2.3 Cloud Computing Defined
2.4 Deployment Models
2.5 Service Models
2.6 Cloud Characteristics
2.7 Cloud Roles
2.8 Evaluate Cloud Providers and Services
2.9 Regions and Zones
2.10 Shared Responsibility Model
2.11 Demonstration - AWS Shared Security Model
2.12 Comparing Cloud to Virtualization
2.13 Comparing Cloud to On Premises
2.14 What is a Virtual Machine
2.15 Demonstration - Deploy a Cloud VM (AWS EC2)
2.16 What is an API
2.17 Capacity Planning Factors
2.18 Licensing, Factors, Requirements and Planning
2.19 Capacity Planning
2.20 Demonstration - AWS Trusted Advisor
2.21 HA and Scaling
2.22 High Availability and Disaster Recovery
2.23 Virtual, System and Communication Protection
2.24 Hypervisor Affinity
2.25 Analyze the solution design
2.26 Business Requirements
2.27 Business Enablers
2.28 Demonstration -AWS Well Architected Tool
2.29 Testing Techniques
2.30 Testing Success Factors
2.31 Module Review Questions
2.32 Module Summary Review
Module 3 - Cloud Security
3.1 Domain Overview
3.2 Configure Identity and Access Management
3.3 Identification and Authorization Management (IAM)
3.4 SDLC
3.5 Directory Services
3.6 Security and Access Controls
3.7 Federation
3.8 SSO and MFA
3.9 Certificates and Key Management
3.10 Secure a Network in a Cloud Environment
3.11 Networking Devices and Segmentation
3.12 Firewalls and Proxies
3.13 NAT and PAT
3.14 Secure Network Configurations (Tunnelling and Encryption)
3.15 Demo Hardening and Configuration Changes
3.16 OS Application Controls and Security Credentials
3.17 Policies and Permissions
3.18 Host and Network Protections (HIDSIPS)
3.19 Virtualization Security
3.20 Monitoring
3.21 Data Security and Compliance Controls in Cloud Environments
3.22 Structured, Unstructured and Semi Structured Data
3.23 Data Classification and Labeling
3.24 Data Loss Prevention
3.25 Demonstration - Google Cloud DLP
3.26 Chain of Custody and Non-Repudiation
3.27 Discussion - CASB
3.28 Module Summary Review
3.29 Module Review Questions
Module 4 - Cloud Deployment
4.1 Domain Overview
4.2 Integrate Components into Cloud Solutions
4.3 Subscription Services
4.4 Demonstration - Provision VM
4.5 Cloud Infrastructure Components
4.6 Whiteboard - Design a Resilent AWS Cloud Architecture
4.7 Containers
4.8 Microservices
4.9 Demonstration - Deploy Containers
4.10 Scaling
4.11 Provision Storage
4.12 Cloud Storage Protocols
4.13 Storage Features
4.14 Storage Cost Considerations
4.15 Storage Performance
4.16 RAID and Tiering
4.17 Demonstration - AWS S3
4.18 Deploy Cloud Networking Solutions
4.19 Connecting to The Cloud
4.20 Network Protocols
4.21 VPNS, VPC and Connectivity
4.22 Whiteboard - AWS VPC Connectivity
4.23 Demonstration - AWS VPC
4.24 Software Defined Networking (SDN)
4.25 Compute Sizing
4.26 Virtualization Considerations
4.27 Resource Rightsizing (CPU, Memory, etc)
4.28 Module Summary Review
4.29 Module Review Questions
Module 5 - Operations and Support
5.1 Domain Overview
5.2 Logging Monitoring and Alerting
5.3 Logging, Storage and Analysis of Data Events
5.4 Monitoring Cloud Resources
5.5 Service Level Agreements
5.6 Demonstration - SLAs in AWS
5.7 Maintain Efficient Operations of a Cloud Environment
5.8 Lifecycle Management
5.9 Change and Asset Management
5.10 SOP, Patching and Upgrades
5.11 Orchestration and Automation
5.12 Orchestration or Automation
5.13 DevOps, IaC and CICD Pipelines
5.14 Playbooks and Templates
5.15 Backup and Restore Operations
5.16 Backup Types, Objects, Targets
5.17 Restore and Recovery
5.18 Module Summary Review
5.19 Module Review Questions
Module 6 - Troubleshooting
6.1 Domain Overview
6.2 Troubleshooting Methodology Intro
6.3 Troubleshooting Methodology
6.4 Troubleshoot Security Issues
6.5 Cloud Attacks
6.6 Security Groups and NACLS
6.7 Troubleshoot Deployment Issues
6.8 Discussion Site Connectivity Issues
6.9 Discussion - Capacity Issues
6.10 Connectivity Issues
6.11 Connectivity Troubleshooting Tools
6.12 Demonstration - GCP AWS Azure Latency Test
6.13 Module Summary Review
6.14 Module Review Questions
Module 7 - Course Closeout
7.1 Exam Preparation
7.2 Course Closeout
Module 0 - Course introduction
0.1 Instructor Intro
0.2 Course Overview
Module 1 - Networking Fundamentals
1.1 Intro to Networking
1.1.1 Activity: Creating a Network
1.2 Common Terminology
1.2.1 Activity: Examining Ports and Sockets
1.3 OSI Model
1.4 DoD Model
1.4.1 Activity: Examining Network Layers
1.5 TCP, UDP, IP
1.5.1 Activity: Examining TCP
1.5.2 Activity: Examining UDP
1.5.3 Activity: Examining IP
1.6 ICMP, IGMP, ARP
1.6.1 Activity: Examining ICMP
1.6.2 Activity: Examining ARP
1.6.3 Activity: Examining IGMP
1.7 Network Topologies
1.8 Network Types
1.9 Part 1: Network Characteristics
1.9 Part 2: Network Characteristics
1.10 Module 1 outro
Module 2 - Cables and Connectors
2.1 Ethernet Standards
2.2 Copper Cable Types
2.3 Fiber Optic Cable Types
2.4 Connector Types
2.4.1 Activity: Selecting the Right Cable
2.5 Media Converters and Transceivers
2.6 Cable Management
2.7 Module 2 Outro
Module 3 - Internet Protocol (IP)
3.1 IPv4 Basics
3.2 IP Packet and Interface Types
3.2.1 Activity: Configuring Client IP Settings
3.3 Binary Numbering System
3.4 Classful and Classless Addressing
3.5 Understanding CIDR Notation
3.6 IPv4 Subnetting Method
3.7 Verifying with Binary
3.8 Finding Subnet IDs
3.8.1 Activity: Subnetting a Class C Network
3.9 The Delta in Action
3.9.1 Activity: Subnetting With the Delta
3.10 Subnetting Based on Hosts
3.11 Subnetting in Other Octets
3.12 Supernetting
3.12.1 Activity: Supernetting
3.13 IPv6
3.14 IPv4 - IPv6 Transition Mechanisms
3.15 Module 3 Outro
Module 4 - Layer 7 Protocols
4.1 Remote Control Protocols
4.2 File Sharing Protocols
4.3 Web Protcols
4.4 Email Protocols
4.5 Database Protocols
4.6 Voice Protocols
4.7 Security Protocols
4.8 Management Protocols
4.9 Module 4 Outro
Module 5 - Network Services
5.1 DHCP
5.1.1 Activity: Configuring DHCP
5.1.2 Activity: Configuring a DHCP Relay Agent
5.2 DNS
5.2.1 Activity: Configuring DNS - Part 1
5.2.2 Activity: Configuring DNS - Part 2
5.3 NTP
5.4 Corporate and Datacenter Network Architecture
5.5 Cloud Concepts and Connectivity Options
5.6 Module 5 Outro
Module 6 - Networking Devices
6.1 Introductory Concepts
6.2 Repeaters and Hubs
6.2.1 Activity: Connecting Devices with a Hub
6.3 Bridges and Switches
6.3.1 Activity: Connecting Devices with a Switch
6.4 Routers and Multilayer Switches
6.5 Security Devices
6.6 Modems
6.7 Module 6 Outro
Module 7 - Networked Devices
7.1 IP Devices
7.2 IoT
7.2.1 Activity - Programming IoT Devices
7.3 ICS/SCADA
7.4 Module 7 Outro
Module 8 - Routing and Bandwidth Management
8.1 Routing Basics
8.1.1 Activity: Configuring Static Routes
8.2 Packet Delivery on the Same Network
8.3 IP Routing Across a Single Router
8.4 IP Routing Across Multiple Hops
8.4.1 Activity: Static Routes - CHALLENGE
8.5 Route Selection
8.6 RIP
8.6.1 Activity: Configuring RIP - CHALLENGE
8.7 OSPF
8.8 EIGRP
8.9 BGP
8.10 NAT/PAT
8.11 Bandwidth Management (with Module 8 Outro)
Module 9 - Ethernet Switching
9.1 Ethernet Basics
9.2 Switching Overview
9.2.1 Activity: Examining a MAC Table
9.3 VLANs
9.3.1 Activity: Creating VLANs
9.4 VLAN Trunking
9.4.1 Activity: Configuring VLAN Trunking
9.5 VLAN Routing
9.5.1 Activity: Configuring VLAN Routing
9.6 Contention Management
9.7 Switchport Configuration (with Module 9 Outro)
Module 10 - Wireless Technologies
10.1 Wireless Overview
10.2 Radio Basics
10.3 Modulation
10.4 Wi-Fi Standards
10.5 Antennas
10.6 Wi-Fi Service Sets
10.7 Wi-Fi Security
10.8 Cellular
Module 11 Network Performance
11.1 Monitoring Performance
11.2 Common Metrics
11.2.1 Activity: Examining Interface Statistics
11.3 SNMP
11.4 Netflow
11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
12.1 HA and DR Concepts
12.2 High Availability Mechanisms
12.3 Disaster Recovery Mechanisms
12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
13.1 Plans and Procedures
13.2 Security Policies
13.3 Loss Prevention
13.4 Common Agreements
13.5 Common Documentation
13.6 Structured Cabling - MDF and IDF
13.7 Horizontal and Vertical Cabling
13.7.1 Activity - Implementing Cable Management
13.8 Labeling
13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
14.1 Common Security Concepts
14.2 Common Attack Types
14.3 Spoofing-based Attacks
14.4 Hijacking and MITM
14.5 Social Engineering
14.6 Network Segmentation
14.7 Private VLANs
14.8 Single Organization Authentication
14.9 Extending Authentication
14.10 Authorization
14.11 Network Device Hardening
14.12 Wireless Security
14.13 Remote Access Security
14.14 IoT Security
14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
15.1 Troubleshooting Methodology
15.2 Physical Connectivity Issues
15.3 Hardware Testing Tools
15.3.1 Activity - Testing an Ethernet Cable
15.3.2 Activity - Crimping on an RJ-45 Connector
15.3.3 Activity - Punching Down Twisted Pair
15.3.4 Activity - Using a Telephone Toner
15.4 Understanding Electricity
15.4.1 Activity - Checking Cable Continuity
15.4.2 Activity - Testing DC Voltage
15.4.3 Activity - Testing AC Voltage
15.5 Twisted Pair Pinout Problems
15.6 Twisted Pair Termination Problems
15.7 Repairing Damaged Twisted Pair Cable
15.8 Fiber Optic Connectivity Issues
15.8.1 Activity - Testing a Fiber Optic Cable
15.9 Common Port Problems
15.9.1 Working with Ports and Their Devices
15.10 Common Software Testing Tools
15.10.1 Activity - Scanning for Open Ports
15.11 Common Command Line Utilities
15.12 Troubleshooting Basic IP Networking Issues
15.13 Common Switching Issues
15.14 Switching Test Tools and Techniques
15.15 Common IP Routing Issues
15.16 Wi-Fi Access Point Issues
15.17 Wirelss Interference
15.17.1 Activity - Using a Spectrum Analyzer
15.18 Wireless Antenna Issues
15.18.1 Activity - Configuring a Wi-Fi Router
15.19 WAP Placement Strategies
15.20 Infrastructure Service Issues (DHCP)
15.21 Infrastructure Service Issues (DNS)
15.22 Infrastructure Service Issues (NTP)
15.23 Fireall / ACL Issues
15.24 VPN Issues
15.25 Additional Network Security Troubleshooting and Tips
15.26 Advanced Networking Issues
15.27 Troubleshooting Server Services (with Module 15 Outro)
CompTIA Network+ N10-008 Course Outro
Module 1 - Introduction to Security
1.1 Introduction to Security
Module 2 - Malware and Social Engineering Attacks
2.1 Malware and Social Engineering Attacks
Module 3 - Basic Cryptography
3.1 Basic Cryptography
Module 4 - Advanced Cryptography and PKI
4.1 Advanced Cryptography and PKI
Module 5 - Networking and Server Attacks
5.1 Networking and Server Attacks
Module 6 - Network Security Devices, Designs and Technology
6.1 Network Security Devices, Designs and Technology
Module 7 - Administering a Secure Network
7.1 Administering a Secure Network
Module 8 - Wireless Network Security
8.1 Wireless Network Security
Module 9 - Client and Application Security
9.1 Client and Application Security
Module 10 - Mobile and Embedded Device Security
10.1 Mobile and Embedded Device Security
Module 11 - Authentication and Account Management
11.1 Authentication and Account Management
Module 12 - Access Management
12.1 Access Management
Module 13 - Vulnerability Assessment and Data Security
13.1 Vulnerability Assessment and Data Security
Module 14 - Business Continuity
14.1 Business Continuity
Module 15 - Risk Mitigation
15.1 Risk Mitigation
Module 16 - Security Plus Summary and Review
16.1 - Security Plus Summary and Review
Module 17 - Hands-On Training
17.1 Hands-On Scanning Part 1
17.2 Hands-On Scanning Part 2
17.3 Hands-On Advanced Scanning
17.4 Hands-On MetaSploit
17.5 Hands-On BurpSuite
17.6 Hands-On Exploitation Tools Part 1
17.7 Hands-On Exploitation Tools Part 2
17.8 Hands-On Invisibility Tools
17.9 Hands-On Connect to Tor
Module 1 - Azure Overview
1.0 Introduction to AZ-104
1.1 Cloud Computing
1.2 Cloud Services Benefits
1.3 Cloud Service Types
1.4 Azure Core Architectural Components
1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
1.5 Azure Compute Services
1.6 Azure Application Hosting Options
1.7 Azure Networking Services
1.8 Azure Storage Services
1.9 Azure Identity, Access, and Security
1.10 Azure Cost Management
1.10.1 ACTIVITY- Checking Your Azure Balance
1.11 Azure Governance and Compliance Tools
1.11.1 ACTIVITY- Assign an Azure Policy
Module 2 - Azure Tools
2.1 Azure Portal
2.1.1 ACTIVITY- Exploring the Azure Portal
2.2 Azure Monitoring Tools
2.3 Azure PowerShell
2.3.1 ACTIVITY- Using Azure PowerShell
2.4 Azure CLI
2.4.1 ACTIVITY- Using the Azure CLI
2.5 Azure Cloud Shell
2.6 ARM Templates
2.6.1 ACTIVITY- Using Templates to Deploy Resources
2.7 Azure Resource Manager
2.8 Hybrid Tools
Module 3 - Azure Identities and Governance
3.1 Azure AD Overview
3.1.1 ACTIVITY- Exploring Azure Active Directory
3.1.2 ACTIVITY- Adding a Custom Domain
3.2 Subscriptions
3.3 Users and Groups
3.3.1 ACTIVITY- Adding Azure Active Directory User
3.3.2 ACTIVITY- Bulk Inviting New Users
3.3.3 ACTIVITY- Creating Azure AD Groups
3.4 Authentication
3.5 SSPR
3.5.1 ACTIVITY- Implementing SSPR
3.6 Devices
3.7 Azure Roles
3.7.1 ACTIVITY- Assigning Azure Roles
3.8 Azure AD Roles
3.8.1 ACTIVITY- Assigning Azure AD Roles
3.9 Conditional Access
3.10 Authorization
3.10.1 ACTIVITY- Managing Licenses
3.11 Azure Policy
Module 4 - Azure Storage
4.1 Storage Accounts
4.1.1 ACTIVITY- Creating a Storage Account
4.2 Storage Types
4.2.1 ACTIVITY- Creating Storage Types
4.3 Azure Storage Tools
4.3.1 ACTIVITY- Azure Storage Explorer
4.4 Azure Files and File Sync
4.4.1 ACTIVITY- Deploying an Azure Files Share
4.5 Azure Storage Security
Module 5 - Azure Compute Resources
5.1 Virtual Machines
5.1.1 ACTIVITY- Create Virtual Machines
5.1.2 ACTIVITY- Delete a Virtual Machine
5.2 VM Availability
5.2.1 ACTIVITY- Increasing VM Availability
5.3 VM Extensions
5.4 Azure App Service
5.5 Azure Container Instances
5.6 Kubernetes
Module 6 - Azure Virtual Networks
6.1 Virtual Networks
6.1.1 ACTIVITY- Create a VNet
6.2 Network Security Groups-Part 1
6.2.1 Network Security Groups-Part 2
6.3 Azure Firewall
6.3.1 ACTIVITY- Deploying a Firewall
6.4 Azure DNS-Part 1
6.4.1 Azure DNS-Part 2
6.4.2 ACTIVITY- Implementing Azure DNS Zone6
6.5 Virtual Network Peering
6.5.1 ACTIVITY- VNet Peering
6.6 Azure VPN Gateway
6.7 ExpressRoute and Virtual WANs
6.8 Azure Load Balancer
6.9 Azure Application Gateway
6.10 Azure Routes
Module 7 - Azure Monitoring and Backup
7.1 Network Watcher
7.2 Azure Monitor
7.3 Azure Backup-Part 1
7.4 Azure Backup-Part 2
7.5 Azure Backup-Part 3
7.6 Conclusion to AZ-104
The Pentester Career Path training series is a meticulously crafted program designed to provide a comprehensive foundation in the field of cybersecurity and penetration testing. This series includes three pivotal courses: CompTIA Network+ N10-008, CompTIA Security+ SY0-601, and CompTIA PenTest+ (PT0-001), each targeting a specific aspect of network security and ethical hacking to equip learners with a well-rounded skill set.
The journey begins with the CompTIA Network+ N10-008, a course that lays the groundwork for understanding the complexities of network configurations, management, and security. This course is essential for grasping the basics of networking, including the design and implementation of functional networks, the use of devices such as switches and routers, and the critical aspects of network traffic segmentation and resilience. It’s an ideal starting point for anyone aiming to delve into the world of cybersecurity, providing the necessary networking knowledge that underpins all areas of this field.
Advancing to the CompTIA Security+ SY0-601, learners dive deeper into the core principles of cybersecurity. This course covers the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection. It’s tailored to impart a thorough understanding of how to secure a network and manage security protocols. The course is constantly updated to reflect the evolving nature of cybersecurity threats, ensuring learners are equipped with the most current knowledge and skills.
Finally, the CompTIA PenTest+ (PT0-001) course offers specialized training in penetration testing and vulnerability assessment. This course is designed for those who wish to pursue a career in ethical hacking. It covers everything from planning and scoping a penetration test to analyzing results and effectively reporting them. This course not only teaches the technical skills required for successful penetration testing but also emphasizes the ethical and legal aspects of this critical cybersecurity role.
Together, these courses in the Pentester Career Path training series provide a robust educational experience, preparing learners for a successful career in cybersecurity and penetration testing. Whether you’re starting from scratch or looking to advance your existing skills, this series offers the knowledge and practical expertise needed to excel in this challenging and rewarding field.
The Pentester Career Path training series is an invaluable resource for a diverse array of individuals and professionals aiming to develop or enhance their skills in cybersecurity and penetration testing. Here’s a list of those who would find this training series particularly beneficial:
This training series is designed to cater to a wide range of skill levels and professional backgrounds, making it an excellent choice for anyone interested in the field of cybersecurity, from beginners to those looking to refine and update their existing expertise in penetration testing.
Essential skills for a penetration tester include a strong understanding of network and system security, proficiency in various programming languages (such as Python, C, and Java), familiarity with operating systems (especially Linux and Windows), and knowledge of security tools and techniques (e.g., Metasploit, Nmap, Burp Suite). Additionally, soft skills like problem-solving, critical thinking, and effective communication are crucial.
Recommended certifications for penetration testers include Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP), CompTIA Security+, and GIAC Penetration Tester (GPEN). These certifications validate skills and knowledge, making candidates more competitive in the job market.
A typical day for a penetration tester may involve planning and conducting security assessments, identifying and exploiting vulnerabilities, reporting findings, and collaborating with other IT professionals to develop and implement security measures. Penetration testers also stay updated with the latest security threats and trends by participating in continuous learning and training.
Main challenges include staying ahead of rapidly evolving threats, dealing with complex and diverse IT environments, balancing thorough testing with time constraints, and effectively communicating technical findings to non-technical stakeholders. Additionally, maintaining ethical standards and avoiding legal issues is critical.
Gaining practical experience can be achieved through hands-on practice in lab environments, participating in Capture The Flag (CTF) competitions, contributing to open-source security projects, and engaging with online platforms that offer practical exercises (e.g., Hack The Box, TryHackMe). Internships and entry-level positions in cybersecurity can also provide valuable real-world experience.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.
I’ve enjoyed the training so far. Wish it was more focused on Linux like other training, but still good.
The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.
This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.