Category Archives: Uncategorized
1. Physical Security Controls In this video, we’re going to be talking about physical security and a whole variety of different physical security controls that we can apply with securing our systems, networks and people. Now, let’s I always start out physical security. Whether I’m teaching a Security Plus, I’m teaching a CISSP or even […]
1. Embedded Systems In this video we’re going to be talking about embedded systems. So first of all, what are embedded systems? Embedded systems are basically systems or computers that are generally there to serve a single purpose. It’s basically a system that contains its own memory, its own processor, its own memory management and […]
240. Conclusion Congratulations, you’ve made it to the end of this course. Now, we’ve covered a lot of material throughout this course and our time together. During our time, we’ve covered everything you need to know to understand all five of the domains covered by the CompTIA PenTest+ certification exam. Let’s review those five domains […]
237. Steganography Tools (OBJ 5.3) In this lesson, we’re going to talk about steganography tools. Now, steganography tools are going to be used to hide and conceal information, communication and activity in plain sight. Now remember, steganography is not a form of encryption, but it is a way of hiding data inside of plain sight, […]
233. Remote Access Tools (OBJ 5.3) In this lesson, we are going to discuss the remote access tools that are covered by the exam. Now, when we talk about remote access tools, we’re talking about tools that are used to give an attacker full control of a workstation, server, or other device remotely over the […]
230. Networking Tools (OBJ 5.3) In this lesson, we’re going to briefly cover the different networking tools that you need to know for the exam. Now, networking tools are used to monitor, analyze, or modify network traffic on a given network. This includes tools like Wireshark, tcpdump, and hping. First, we have Wireshark, which is […]
227. Tool Round-up (OBJ 5.3) In this section of the course, we’re going to perform a quick review and summary of all the different tools that are covered on the PenTest Plus exam. Now we’ve already covered a lot, if not all of these tools during our time together, but for the sake of completeness, […]
223. Exploits for Enumerating Users (OBJ 5.2) In this lesson, we’re going to talk about exploits for enumerating users in a couple of different languages. First, we have PowerShell. If you want to list all the users in a domain, you can simply use this command on one line; Import-Module ActiveDirectory; Get-ADUser-Identity <username>-properties*. This’ll return […]
220. Exploits and Automation (OBJ 5.2) In this section of the course, we’re going to discuss some different exploits and automations that you can perform using scripting and programming language code during your engagements. Now, as we move throughout this section, we’re going to continue looking at the Fifth Domain for our exam, which is […]
216. Coding in JavaScript (OBJ 5.2) In this lesson, we’re going to talk about coding in JavaScript. JavaScript is a truly powerful programming language, that can add interactivity to a website. JavaScript is a relatively compact and flexible language, but programmers have created a lot of different tools, on top of the core JavaScript language, […]