
Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
12m:23s
Video
2.
Download your free study guide
PDF
3.
Exam Tips
4m:14s
Video
4.
How to Use the Lab Environment
5m:27s
Video
5.
Labs: Exploring the PenTest+ Lab Environment
Lab
6.
100% Pass Guarantee
3m:49s
Video
7.
Checkpoint: Introduction
Quiz
2 -
PenTesting Overview
#
Lesson
Duration
Type
1.
PenTesting Overview
2m:54s
Video
2.
Planning the Engagement
4m:23s
Video
3.
Information Gathering
4m:2s
Video
4.
Attacks and Exploits
3m:29s
Video
5.
Post-Exploitation
3m:4s
Video
6.
Reporting
3m:47s
Video
7.
Overview of a PenTest
9m:18s
Video
8.
Checkpoint: PenTesting Overview
Quiz
3 -
Pre-Engagement Activities
#
Lesson
Duration
Type
1.
Pre-Engagement Activities
3m:20s
Video
2.
Regulations and Standards
6m:24s
Video
3.
Types of Assessments
4m:32s
Video
4.
Types of Agreements
4m:17s
Video
5.
Legal and Ethical Considerations
4m:31s
Video
6.
Rules of Engagement
4m:48s
Video
7.
Target Selection
4m:54s
Video
8.
Shared Responsibility Model
4m:23s
Video
9.
Preparing to PenTest a Cloud Provider
4m:13s
Video
10.
Checkpoint: Pre-Engagement Activities
Quiz
4 -
Frameworks
#
Lesson
Duration
Type
1.
Frameworks
3m:43s
Video
2.
MITRE ATT&CK
4m:54s
Video
3.
OWASP
4m:55s
Video
4.
MASVS
4m:14s
Video
5.
PTES
5m:22s
Video
6.
CREST
3m:54s
Video
7.
OSSTMM
3m:8s
Video
8.
STRIDE
5m:41s
Video
9.
Purdue Model
3m:55s
Video
10.
OCTAVE
6m:53s
Video
11.
DREAD
5m:9s
Video
12.
Using the MITRE ATT&CK Framework
4m:33s
Video
13.
Checkpoint: Frameworks
Quiz
5 -
Information Gathering
#
Lesson
Duration
Type
1.
Information Gathering
3m:9s
Video
2.
Passive Reconnaissance
3m:30s
Video
3.
Network Sniffing
5m:10s
Video
4.
Active Reconnaissance
3m:47s
Video
5.
Port and Protocol Scanning
5m:51s
Video
6.
HTML Scraping and Cached Pages
2m:59s
Video
7.
Banner Grabbing
5m:2s
Video
8.
Conducting Banner Grabbing
3m:45s
Video
9.
Checkpoint: Information Gathering
Quiz
6 -
Open-Source Intelligence (OSINT)
#
Lesson
Duration
Type
1.
Open-Source Intelligence (OSINT)
2m:48s
Video
2.
Social Media and Job Boards
4m:45s
Video
3.
Information Disclosures
4m:8s
Video
4.
Cryptographic Flaws
6m:31s
Video
5.
DNS Lookups
7m:40s
Video
6.
Certificate Transparency Logs
4m:50s
Video
7.
Search Engine Analysis
4m:27s
Video
8.
Conducting OSINT
10m:35s
Video
9.
Checkpoint: Open-Source Intelligence (OSINT)
Quiz
7 -
Scanning and Enumeration
#
Lesson
Duration
Type
1.
Scanning and Enumeration
3m:56s
Video
2.
OS and Service Discovery
14m:58s
Video
3.
Enumerating Protocols
4m:52s
Video
4.
Enumerating DNS
3m:56s
Video
5.
Enumerating Directories
5m:1s
Video
6.
Enumerating Hosts
6m:44s
Video
7.
Enumerating Users
2m:45s
Video
8.
Enumerating Email
3m:17s
Video
9.
Enumerating Permissions
4m:57s
Video
10.
Enumerating Wireless Devices
4m:27s
Video
11.
Enumerating Secrets
4m:53s
Video
12.
Enumerating the Web
4m:38s
Video
13.
Attack Path Mapping
3m:22s
Video
14.
Checkpoint: Scanning and Enumeration
Quiz
8 -
Recon and Enumeration Tools
#
Lesson
Duration
Type
1.
Reconnaissance and Enumeration Tools
3m:36s
Video
2.
Wayback Machine
2m:46s
Video
3.
theHarvester and Hunter.io
4m:54s
Video
4.
OSINT Tools
4m:5s
Video
5.
Whois and recon-ng
20m:32s
Video
6.
nslookup and dig
6m:58s
Video
7.
DNSdumpster and Amass
6m:30s
Video
8.
Shodan and Censys.io
5m:42s
Video
9.
tcpdump
5m:31s
Video
10.
Wireshark
5m:42s
Video
11.
Wireless Analysis Tools
5m:12s
Video
12.
Checkpoint: Recon and Enumeration Tools
Quiz
9 -
Nmap and NSE
#
Lesson
Duration
Type
1.
Nmap and NSE
2m:34s
Video
2.
Nmap Discovery Scans
7m:54s
Video
3.
Nmap Port Scans
9m:13s
Video
4.
Nmap Fingerprinting
4m:13s
Video
5.
Using Nmap
11m:31s
Video
6.
Nmap Scripting Engine
7m:0s
Video
7.
Checkpoint: Nmap and NSE
Quiz
10 -
Scripting Basics
#
Lesson
Duration
Type
1.
Scripting Basics
2m:11s
Video
2.
Shells and Programming Languages
9m:48s
Video
3.
Variables
7m:52s
Video
4.
Loops
5m:20s
Video
5.
Logic Control
4m:33s
Video
6.
Data Structures
12m:37s
Video
7.
Object Oriented Programming
6m:58s
Video
8.
Checkpoint: Scripting Basics
Quiz
11 -
Modifying Scripts
#
Lesson
Duration
Type
1.
Modifying Scripts
2m:55s
Video
2.
Bash Fundamentals
21m:16s
Video
3.
Understanding a Bash Script
4m:31s
Video
4.
Modifying a Bash Script
8m:44s
Video
5.
PowerShell Fundamentals
15m:41s
Video
6.
Understanding a PowerShell Script
3m:20s
Video
7.
Modifying a PowerShell Script
7m:42s
Video
8.
Python Fundamentals
20m:27s
Video
9.
Understanding a Python Script
3m:35s
Video
10.
Modifying a Python Script
5m:33s
Video
11.
Checkpoint: Modifying Scripts
Quiz
12 -
Analyzing Scans
#
Lesson
Duration
Type
1.
Analyzing Scans
3m:11s
Video
2.
Positive and Negative Results
4m:12s
Video
3.
Validating Scan Results
3m:56s
Video
4.
Using CVEs and CVSS
6m:16s
Video
5.
Exploit Prediction Scoring System
3m:44s
Video
6.
Target Prioritization
3m:50s
Video
7.
Common Target Criteria
4m:3s
Video
8.
Scripting for Result Validation
3m:1s
Video
9.
Scan Validations
3m:38s
Video
10.
Capability Selection
4m:30s
Video
11.
Documenting the Attack
6m:12s
Video
12.
Other Attack Considerations
4m:25s
Video
13.
Checkpoint: Analyzing Scans
Quiz
13 -
Discovering Vulnerabilities
#
Lesson
Duration
Type
1.
Discovering Vulnerabilities
2m:14s
Video
2.
Application Scanning
4m:55s
Video
3.
Software Analysis
5m:54s
Video
4.
Host-Based Scanning
4m:25s
Video
5.
Network Scanning
5m:3s
Video
6.
Mobile Scanning
3m:17s
Video
7.
Container Scanning
5m:11s
Video
8.
Scanning IaC
5m:34s
Video
9.
ICS Vulnerability Discovery
5m:21s
Video
10.
Wireless Scans
4m:56s
Video
11.
Static Code Analysis (SonarQube)
5m:49s
Video
12.
Checkpoint: Discovering Vulnerabilities
Quiz
14 -
Vulnerability Discovery Tools
#
Lesson
Duration
Type
1.
Vulnerability Discovery Tools
2m:12s
Video
2.
Nikto
5m:16s
Video
3.
Greenbone/OpenVAS
13m:32s
Video
4.
Trivy
3m:44s
Video
5.
BloodHound
6m:6s
Video
6.
PowerSploit
1m:30s
Video
7.
Grype
3m:13s
Video
8.
Kube-Hunter
3m:10s
Video
9.
TruffleHog
3m:25s
Video
10.
Checkpoint: Vulnerability Discovery Tools
Quiz
15 -
Social Engineering Attacks
#
Lesson
Duration
Type
1.
Social Engineering Attacks
3m:15s
Video
2.
Methods of Influence
11m:2s
Video
3.
Phishing Campaigns
4m:35s
Video
4.
Using the Social Engineering Toolkit (SET)
13m:38s
Video
5.
Gophish
6m:12s
Video
6.
Impersonation
4m:17s
Video
7.
Surveillance Techniques
2m:45s
Video
8.
Watering Hole
3m:2s
Video
9.
Evilginx
5m:35s
Video
10.
Tailgating and Piggybacking
3m:40s
Video
11.
Browser Exploitation Framework (BeEF)
3m:4s
Video
12.
Checkpoint: Social Engineering Attacks
Quiz
16 -
Wireless Attacks
#
Lesson
Duration
Type
1.
Wireless Attacks
2m:38s
Video
2.
Wireless Security
16m:26s
Video
3.
Wireless Signal Exploitation
4m:1s
Video
4.
Aircrack-ng
4m:54s
Video
5.
Wireless Hacking
8m:34s
Video
6.
WPS PIN Attacks
11m:37s
Video
7.
Captive Portal Attacks
4m:28s
Video
8.
Evil Twin
2m:59s
Video
9.
Kismet
3m:51s
Video
10.
Wi-Fi Protocol Fuzzing
4m:21s
Video
11.
Checkpoint: Wireless Attacks
Quiz
17 -
Network Attacks
#
Lesson
Duration
Type
1.
Network Attacks
3m:51s
Video
2.
Stress Testing
6m:22s
Video
3.
Bypassing Segmentation
5m:21s
Video
4.
MAC Spoofing
5m:12s
Video
5.
NAC Bypass
4m:42s
Video
6.
Session-Based Attacks
3m:51s
Video
7.
Service Exploitation
5m:25s
Video
8.
Packet Crafting
4m:24s
Video
9.
Netcat
7m:36s
Video
10.
Using Netcat
10m:59s
Video
11.
Default Network Credentials
5m:2s
Video
12.
LLMNR/NBT-NS Poisoning
4m:43s
Video
13.
ARP Poisoning
7m:5s
Video
14.
Intro to Metasploit
5m:29s
Video
15.
Checkpoint: Network Attacks
Quiz
18 -
Authentication Attacks
#
Lesson
Duration
Type
1.
Authentication Attacks
3m:24s
Video
2.
Types of Password Attack
4m:3s
Video
3.
Password Cracking Tools
7m:54s
Video
4.
Credential Attacks
7m:10s
Video
5.
Credential Passing Attacks
5m:9s
Video
6.
Directory Service Attacks
4m:16s
Video
7.
CrackMapExec (CME)
2m:8s
Video
8.
SAML Attacks
5m:27s
Video
9.
OpenID Connect (OIDC) Attacks
5m:42s
Video
10.
Hash Attacks
4m:3s
Video
11.
Checkpoint: Authentication Attacks
Quiz
19 -
Host Attacks
#
Lesson
Duration
Type
1.
Host Attacks
3m:16s
Video
2.
Privilege Escalation
6m:31s
Video
3.
Conducting Privilege Escalation
13m:6s
Video
4.
Credential Harvesting
3m:55s
Video
5.
Misconfigured Endpoints
3m:34s
Video
6.
Unquoted Service Paths
4m:25s
Video
7.
Disabling Security Software
6m:19s
Video
8.
Payload Obfuscation
4m:27s
Video
9.
User-Controlled Access Bypass
7m:2s
Video
10.
Shell and Kiosk Escapes
3m:58s
Video
11.
Library and Process Injection
6m:57s
Video
12.
Log Tampering
3m:3s
Video
13.
Living Off the Land
3m:28s
Video
14.
Checkpoint: Host Attacks
Quiz
20 -
Web Application Vulnerabilities
#
Lesson
Duration
Type
1.
Web Application Vulnerabilities
2m:51s
Video
2.
Race Conditions
4m:53s
Video
3.
Buffer Overflows
12m:26s
Video
4.
Buffer Overflow Attacks
6m:13s
Video
5.
Authentication Flaws and Insecure References
5m:53s
Video
6.
Improper Error Handling
5m:13s
Video
7.
Improper Headers
6m:8s
Video
8.
Code Signing
1m:58s
Video
9.
Vulnerable Components
11m:41s
Video
10.
Software Composition
9m:46s
Video
11.
Checkpoint: Web Application Vulnerabilities
Quiz
21 -
Web Application Attacks
#
Lesson
Duration
Type
1.
Web Application Attacks
3m:20s
Video
2.
Directory Traversals
9m:32s
Video
3.
Directory Traversal Tools
10m:32s
Video
4.
Cross-Site Scripting (XSS)
8m:56s
Video
5.
Request Forgeries
4m:5s
Video
6.
SQL Injections
7m:0s
Video
7.
Performing SQL Injection Attacks
8m:27s
Video
8.
Injection Attacks
5m:21s
Video
9.
File Inclusions
3m:52s
Video
10.
Arbitrary Code Execution
4m:20s
Video
11.
Web Application Session Hijacking
5m:39s
Video
12.
Abusing APIs
7m:17s
Video
13.
OWASP ZAP
5m:7s
Video
14.
Attacking Web Applications
15m:36s
Video
15.
Checkpoint: Web Application Attacks
Quiz
22 -
Cloud Attacks
#
Lesson
Duration
Type
1.
Cloud Attacks
2m:53s
Video
2.
Identity and Access Management (IAM) Misconfigurations
4m:13s
Video
3.
Resource Misconfigurations
4m:33s
Video
4.
Logging Information Exposures
4m:32s
Video
5.
Metadata Service Attacks
6m:27s
Video
6.
Image and Artifact Tampering
5m:59s
Video
7.
Supply Chain Attacks
4m:54s
Video
8.
Container Exploits and Attacks
3m:46s
Video
9.
Trust Relationship Abuse
6m:38s
Video
10.
Third-party Integration Exploits
5m:12s
Video
11.
Cloud Security Testing
6m:11s
Video
12.
Conducting Cloud Audits
13m:58s
Video
13.
Checkpoint: Cloud Attacks
Quiz
23 -
Attacking Specialized Systems
#
Lesson
Duration
Type
1.
Attacking Specialized Systems
2m:46s
Video
2.
Mobile Device Attacks
12m:15s
Video
3.
Tools for Mobile Device Attacks
5m:8s
Video
4.
Bluetooth Attacks
3m:9s
Video
5.
NFC and RFID Attacks
4m:46s
Video
6.
AI Attacks
4m:35s
Video
7.
Operational Technology (OT)
9m:14s
Video
8.
OT Attacks
10m:50s
Video
9.
Testing OT Systems
3m:37s
Video
10.
Checkpoint: Attacking Specialized Systems
Quiz
24 -
Automated Attacks
#
Lesson
Duration
Type
1.
Automated Attacks
2m:58s
Video
2.
Automating Attacks with Bash
3m:41s
Video
3.
Empire/PowerSploit
4m:47s
Video
4.
PowerView
4m:29s
Video
5.
PowerUpSQL
5m:47s
Video
6.
AD Search
5m:34s
Video
7.
Impacket
3m:8s
Video
8.
Scapy
6m:49s
Video
9.
Caldera
4m:8s
Video
10.
Infection Monkey
3m:9s
Video
11.
Atomic Red Team
4m:10s
Video
12.
Checkpoint: Automated Attacks
Quiz
25 -
Persistence
#
Lesson
Duration
Type
1.
Persistence
2m:37s
Video
2.
Command and Control
3m:41s
Video
3.
Automating Persistence
5m:6s
Video
4.
Remote Shells
4m:8s
Video
5.
Using Remote Shells
4m:55s
Video
6.
Backdoor
5m:53s
Video
7.
Remote Access Trojans
5m:45s
Video
8.
Account Credentials
5m:32s
Video
9.
Browser-Based Persistence
5m:16s
Video
10.
Security Control Tampering
6m:53s
Video
11.
Checkpoint: Persistence
Quiz
26 -
Lateral Movement
#
Lesson
Duration
Type
1.
Lateral Movement
3m:4s
Video
2.
Pivoting and Relaying
3m:5s
Video
3.
Using ProxyChains
7m:43s
Video
4.
Enumerating for Lateral Movement
3m:21s
Video
5.
Service Discovery
5m:41s
Video
6.
Protocol Discovery
3m:0s
Video
7.
Remote Access Discovery
4m:27s
Video
8.
Printer Discovery
4m:19s
Video
9.
Discovering Internal Websites
8m:26s
Video
10.
Living Off the Land Tools
4m:30s
Video
11.
sshuttle
4m:39s
Video
12.
Covenant
5m:7s
Video
13.
Checkpoint: Lateral Movement
Quiz
27 -
Exfiltration
#
Lesson
Duration
Type
1.
Exfiltration
2m:33s
Video
2.
Covert Channels
4m:4s
Video
3.
Steganography
5m:46s
Video
4.
Covert Channel Using DNS
7m:39s
Video
5.
Covert Channel Using ICMP
3m:34s
Video
6.
Covert Channel Using HTTPS
4m:42s
Video
7.
Alternate Data Streams (ADS)
3m:50s
Video
8.
Exfiltrating Data
4m:15s
Video
9.
Checkpoint: Exfiltration
Quiz
28 -
Cleanup and Restoration
#
Lesson
Duration
Type
1.
Cleanup and Restoration
2m:6s
Video
2.
Persistence Removal
3m:20s
Video
3.
Revert Configuration Changes
3m:23s
Video
4.
Created Credentials Removal
2m:32s
Video
5.
Removal of Testing Tools
2m:25s
Video
6.
Decommission Testing Infrastructure
3m:9s
Video
7.
Artifact Preservation
2m:38s
Video
8.
Secure Data Destruction
2m:34s
Video
9.
Checkpoint: Cleanup and Restoration
Quiz
29 -
Remediation Recommendations
#
Lesson
Duration
Type
1.
Remediation Recommendations
2m:27s
Video
2.
System Hardening
10m:50s
Video
3.
User Input Sanitization
4m:42s
Video
4.
Network and Infrastructure Controls
3m:55s
Video
5.
Authentication Recommendations
4m:27s
Video
6.
Encryption Recommendations
4m:45s
Video
7.
Patch Management
3m:51s
Video
8.
Process Level Remediation
2m:57s
Video
9.
Administrative Controls
14m:20s
Video
10.
Physical Controls
6m:55s
Video
11.
Operational Controls and Policies
2m:55s
Video
12.
Implementing Recommendations
8m:50s
Video
13.
Checkpoint: Remediation Recommendations
Quiz
30 -
Penetration Test Reporting
#
Lesson
Duration
Type
1.
Penetration Test Reporting
2m:30s
Video
2.
Executive Summary Process
2m:57s
Video
3.
Root Cause Analysis
4m:24s
Video
4.
Report Components
4m:25s
Video
5.
Risk Scoring and Prioritization
3m:39s
Video
6.
Definitions in the Report
3m:37s
Video
7.
Limits and Assumptions
4m:23s
Video
8.
Special Considerations
5m:37s
Video
9.
Report Analysis Workshop
7m:3s
Video
10.
Checkpoint: Penetration Test Reporting
Quiz
31 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
12m:47s
Video
2.
BONUS: What comes next?
3m:44s
Video
3.
Practice Exam
Exam



