5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     CompTIA     CompTIA PenTest+     CompTIA PenTest+ (PT0-002)
Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course, you'll learn about post-exploitation techniques and tools. You'll explore common post-exploitation tools such as Empire, Mimikatz, and BloodHound. Next, you'll examine post-exploitation techniques such as lateral movement, privilege escalation, and upgrading a restrictive shell. You'll learn techniques used to maintain foothold and persistence using trojans, backdoors, and daemons. Finally, you'll learn detection avoidance techniques, as well as enumeration techniques used to extract users, groups, forests, sensitive data, and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

Objectives

CompTIA PenTest+ (PT0-002): Post-Exploitation Techniques

  • discover the key concepts covered in this course
  • demonstrate how to use the Empire post-exploitation tool
  • demonstrate how to use the Mimikatz post-exploitation tool
  • demonstrate how to use the BloodHound post exploitation tool
  • define lateral movement in post-exploitation exercises
  • recognize how to perform network segmentation testing
  • provide an overview of privilege escalation and differentiate between horizontal and vertical escalation
  • recognize how and why to perform a restrictive shell upgrade
  • recognize techniques used to maintain foothold and persistence
  • identify ways to cover tracks and avoid detection
  • differentiate between enumeration techniques used to gather user, group, and forest information
  • summarize the key concepts covered in this course