The 2023 Professional CompTIA Exam Certification Prep Bundle

2 Reviews
287 Enrolled
8 Courses & 113 Hours
You save 97% -

What's Included

TOTAL: CompTIA PenTest+ (PT0-002)
  • Experience level required: All levels
  • Access 133 lectures & 14 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

133 Lessons (14h)

  • Your First Program
  • Introduction to Ethical Hacking & CompTIA PenTest+ (PT0-002)
    Introduction to the CompTIA PenTest+ (PT0-002) Course2:09
    About the CompTIA PenTest+ (PT0-002) Exam7:21
  • Planning and Engagement
    Planning a Pen Test8:21
    Rules of Engagement10:28
    Regulatory Compliance4:23
    Resources and Budgets7:07
    Impact and Constraints5:06
    Support Resources13:14
    Legal Groundwork11:43
    Service Provider Agreements2:12
    Standards and Methodologies, Part 16:48
    Standards and Methodologies, Part 29:17
    Environmental and Scoping Considerations13:38
    Ethical Mindset5:36
    Lab Environment Setup17:32
    Project Strategy and Risk9:12
    Scope Vulnerabilities13:19
    Compliance-Based Assessments4:08
    Chapter 1 Quiz
  • Information Gathering and Vulnerability Scanning
    Scanning and Enumeration4:16
    Scanning and Demo10:46
    Packet Investigation7:57
    Packet Inspection Demo5:48
    Labtainers Setup12:09
    Labtainers Lab (Wireshark)8:54
    Application and Open-Source Resources11:38
    Passive Reconnaissance10:07
    Active Reconnaissance7:50
    Vulnerability Scanning8:41
    Vulnerability Scanning Demo16:20
    Labtainers Lab (Network Basics)2:50
    Labtainers Lab (Nmap Discovery)3:12
    Target Considerations15:36
    Analyzing Scan Output5:01
    Nmap Scoping and Output Options21:04
    Nmap Timing and Performance Options6:31
    Prioritization of Vulnerabilities9:07
    Common Attack Techniques12:05
    Automating Vulnerability Scans3:35
    Credential Attacks14:31
    Labtainers Lab (Password Cracking)2:23
    Labtainers Lab (Secure Socket Layers)2:30
    Labtainers Lab (Routing Basics)1:59
    Chapter 2 Quiz
  • Network-Based Attacks
    Exploit Resources and Network Attacks4:37
    Network-Based Exploits7:07
    FTP Exploit Demo8:14
    Man-in-the-Middle Exploits7:06
    Labtainers Lab (TCP/IP Attacks)2:09
    Labtainers Lab (ARP Spoof Attack)1:53
    Labtainers Lab (Local DNS Attacks)1:47
    Labtainers Lab (MACs and Hash Functions)1:19
    Chapter 3 Quiz
  • Wireless and RF Attacks
    Wireless Exploits13:17
    Wireless Exploits, Part 22:46
    Chapter 4 Quiz
  • Reporting and Communication
    OWASP Top 108:40
    Application Exploits, Part 15:34
    SQL Injection Demo8:41
    Labtainers Lab (SQL Injection)2:38
    Application Exploits, Part 28:02
    Application Exploits, Part 39:11
    Cross-Site Scripting Demo7:00
    Labtainers Lab (Cross-Site Scripting)1:36
    Labtainers Lab (Cross-Site Request Forgery)1:14
    Code Vulnerabilities16:36
    API Attacks and Attack Resources6:28
    Privilege Escalation (Linux)9:37
    Privilege Escalation (Windows)6:09
    Misc. Privilege Escalation7:54
    Misc. Local Host Vulnerabilities8:05
    Chapter 5 Quiz
  • Attacking the Cloud
    Cloud Attacks, Part 14:50
    Cloud Attacks, Part 24:39
    Chapter 6 Quiz
  • Specialized and Fragile Systems
    Mobile Attacks10:25
    IoT Attacks10:18
    Data Storage and Management Interface Attacks8:58
    Virtual and Containerized Environment Attacks7:31
    Labtainers Lab (Industrial Control System)1:51
    Chapter 7 Quiz
  • Social Engineering and Physical Attacks
    Pretext for a Social Engineering Attack2:31
    Remote Social Engineering6:10
    Spear Phishing Demo10:09
    In-Person Social Engineering11:45
    Physical Security11:17
    Chapter 8 Quiz
  • Post-Exploitation
    Post-Exploitation Techniques11:07
    Post-Exploitation Tools3:22
    Network Segmentation Testing3:00
    Persistence and Stealth10:45
    Detection Avoidance Techniques6:16
    Chapter 9 Quiz
  • Post-Engagement Activities
    Report Writing14:47
    Important Components of Written Reports2:37
    Mitigation Strategies5:00
    Technical and Physical Controls3:46
    Administrative and Operational Controls5:10
    Presentation of Findings2:57
    Post-Report Activities5:23
    Data Destruction Process1:37
    Chapter 10 Quiz
  • Tools and Programming
    Using Scripting in Pen Testing12:32
    Bash Scripting Basics14:55
    Bash Scripting Techniques10:11
    PowerShell Scripts4:02
    Ruby Scripts6:32
    Python Scripts5:45
    Scripting Languages Comparison10:56
    Data Structures, Part 17:41
    Data Structures, Part 28:12
    Procedures and Functions5:48
    Perl and Javascript5:41
    Chapter 11 Quiz
  • Tools Inventory
    Pen Testing Toolbox6:46
    Using Kali Linux6:14
    Scanners and Credential Tools9:52
    Code Cracking Tools4:20
    Open Source Research Tools6:21
    Wireless and Web Pen Testing Tools10:48
    Remote Access Tools6:15
    Analyzers and Mobile Pen Testing Tools2:29
    Other Pen Testing Tools4:19
    Labtainers Lab (Metasploit Framework)2:00
    Labtainers Lab (Wireshark Packet Inspection)1:44
    Labtainers Lab (SSH)0:58
    Scanners, Debuggers, and Wireless Tools9:51
    Web, Steganography, and Cloud Tools9:08
    Chapter 12 Quiz

TOTAL: CompTIA PenTest+ (PT0-002)

Total Seminars, LLC

Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros

4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.


Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. Keep in mind there's much more to being an ethical hacker than what's covered here, including how to secure a network, however, this course focuses on how to be a pen tester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

4.6/5 average rating: ★ ★ ★ ★

  • Access 133 lectures & 14 hours of content 24/7
  • Scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable & DVWA
  • Scope, plan & execute a pen test engagement from start to finish

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.


Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here


  • It’s recommended to be familiar with the information in the CompTIA Network+ and Security+ exams


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...