We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Information Gathering and Vulnerability Scanning for CompTIA Pentest+

Ricardo Reimao

Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification.

Read more

Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification.

With the pentest plan and scope defined, your next step it to gather information about your target as well as perform vulnerability scans to understand the potential attack vectors that can be exploited. In this course, Information Gathering and Vulnerability Scanning for CompTIA Pentest+, you’ll learn how to gather personal and technical information about your target that will be later used during the exploitation phase. First, you’ll explore how to gather technical information about your target. Next, you’ll discover how to harvest information about the employees of a company. Finally, you’ll learn how to perform vulnerability scans to identify potential vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of Information Gathering and Vulnerability Scanning needed for the CompTIA Pentest+ Certification (PT0-002).

Enroll now

What's inside

Syllabus

Course Overview
Technical Information Gathering
People Information Gathering
Performing Vulnerability Scans
Read more
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Ricardo Reimao, who are recognized for their work in Pentest+
Examines information gathering, which is highly relevant for Pentest+
Examines vulnerability scanning, which is highly relevant for Pentest+
Develops the skills and knowledge of Information Gathering and Vulnerability Scanning needed for the CompTIA Pentest+ Certification (PT0-002)
This course explicitly requires that this course be taken in serial with others as part of a series

Save this course

Save Information Gathering and Vulnerability Scanning for CompTIA Pentest+ to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Information Gathering and Vulnerability Scanning for CompTIA Pentest+. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Information Gathering and Vulnerability Scanning for CompTIA Pentest+ will develop knowledge and skills that may be useful to these careers:
IT Auditor
An IT Auditor reviews an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Information Security Analyst
An Information Security Analyst implements and maintains measures to identify, prevent, and defend against cybersecurity threats to computer systems, networks, programs, and data. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Security Analyst
A Security Analyst monitors and analyzes security data to detect and respond to threats, vulnerabilities, and incidents. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Incident Responder
An Incident Responder investigates and resolves security incidents, such as data breaches, malware attacks, and unauthorized access. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains cybersecurity systems to protect an organization from unauthorized access or malicious activity. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Penetration Tester
A Penetration Tester simulates attacks on a computer system or network to identify vulnerabilities that could be exploited by malicious actors. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Malware Analyst
A Malware Analyst investigates and analyzes malware to identify how it works, how it spreads, and how to protect against it. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Chief Information Security Officer (CISO)
A CISO is responsible for developing and implementing an organization's cybersecurity strategy. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Vulnerability Manager
A Vulnerability Manager identifies, assesses, and prioritizes vulnerabilities in an organization's systems and networks. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Ethical Hacker
An Ethical Hacker uses their skills to identify and exploit vulnerabilities in a computer system or network with the permission of the owner. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Cybersecurity Manager
A Cybersecurity Manager is responsible for managing an organization's cybersecurity program. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Threat Intelligence Analyst
A Threat Intelligence Analyst collects and analyzes information about cybersecurity threats to identify and assess the risks to an organization. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Cyber Risk Analyst
A Cyber Risk Analyst assesses the risks to an organization's cybersecurity and develops strategies to mitigate those risks. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
SOC Analyst
A SOC Analyst monitors and analyzes security data to detect and respond to threats, vulnerabilities, and incidents in a Security Operations Center (SOC). This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.
Forensic Examiner
A Forensic Examiner investigates and analyzes digital evidence to uncover facts about computer crimes. This course may help build a foundation for this role by teaching you how to gather personal and technical information about your target, and perform vulnerability scans to identify potential vulnerabilities.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Information Gathering and Vulnerability Scanning for CompTIA Pentest+.
Offers a practical approach to penetration testing, with a focus on real-world scenarios and techniques used by professional hackers. It includes guidance on reconnaissance, vulnerability assessment, and exploitation.
Covers advanced penetration testing techniques and tools used by professional hackers. It includes guidance on reconnaissance, vulnerability assessment, and exploitation for complex networks and systems.
Provides a balanced view of ethical hacking techniques, covering both the offensive and defensive aspects of information security. It covers reconnaissance, vulnerability assessment, and remediation measures.
Provides a comprehensive overview of security assessment and penetration testing. It covers reconnaissance, vulnerability assessment, and remediation measures for various network systems.
Offers a technical and practical approach to exploitation techniques. It covers reconnaissance, vulnerability assessment, and exploiting various operating systems and applications.
Provides a comprehensive overview of advanced penetration testing techniques. It covers reconnaissance, vulnerability assessment, and exploiting various systems and networks.
Provides a comprehensive overview of social engineering techniques. It covers reconnaissance, vulnerability assessment, and exploiting human behavior for security breaches.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Information Gathering and Vulnerability Scanning for CompTIA Pentest+.
Specialized Testing: API Testing
Most relevant
Technical Information Gathering with theHarvester
Most relevant
Planning and Scoping for CompTIA Pentest+
Most relevant
Attacks and Exploits: Network and Application Attacks for...
Most relevant
Tools and Code Analysis for CompTIA Pentest+
Most relevant
Web Application Penetration Testing with Burp Suite
Most relevant
OpenVAS Concepts and Scanning
Most relevant
TOTAL: CompTIA PenTest+ (Ethical Hacking) PT0-002 + 2...
Most relevant
Attacks and Exploits: Specialized Attacks and Post...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser