Packt

Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep

通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

Packt

Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Learn to plan and execute penetration tests following industry best practices.

  • Develop skills to scan for vulnerabilities, exploit weaknesses, and assess security posture.

  • Gain hands-on experience with tools like Metasploit, Wireshark, and Nmap.

  • Master advanced topics such as privilege escalation, social engineering, and post-exploitation techniques.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

March 2026

作业

14 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有13个模块

In this module, we will introduce you to the CompTIA PenTest+ (PT0-003) exam, detailing the exam objectives and the core ethical hacking topics covered throughout the course. You will also gain insight into the latest updates to the exam, ensuring you are well-equipped for success. This foundation will guide you through your learning journey, ensuring thorough preparation for the certification.

涵盖的内容

2个视频1篇阅读材料

In this module, we will cover essential aspects of planning and engaging in penetration tests. You will learn how to establish proper guidelines, scope, and legal frameworks for ethical hacking projects. Additionally, we’ll discuss best practices for managing client expectations and ensuring regulatory compliance throughout your engagements.

涵盖的内容

12个视频1个作业

In this module, we will dive into the process of information gathering and vulnerability scanning. You'll learn to leverage tools like Nmap and Wireshark for gathering data, scanning networks, and prioritizing vulnerabilities. By the end of the module, you will have hands-on experience in identifying and analyzing weak points in a network to prepare for further exploitation.

涵盖的内容

26个视频1个作业

In this module, we will explore network-based exploits, focusing on common vulnerabilities found in protocols like DNS, ARP, SMB, and FTP. You'll gain practical experience in launching attacks such as man-in-the-middle, DNS spoofing, and FTP exploits, learning how to exploit these weaknesses for penetration testing engagements.

涵盖的内容

8个视频1个作业

In this module, we will explore wireless and RF attacks that target vulnerabilities in modern wireless networks. From packet sniffing and jamming to advanced techniques like evil twin and WPS exploitation, this module will provide you with the tools and knowledge to effectively exploit wireless communication weaknesses.

涵盖的内容

2个视频1个作业

In this module, we will focus on web and database attacks, including SQL injection, cross-site scripting (XSS), and privilege escalation techniques. You will practice exploiting common web application vulnerabilities using tools like Burp Suite and SQLmap, preparing you for real-world penetration testing scenarios.

涵盖的内容

14个视频1个作业

In this module, we will dive into attacking the cloud, examining the vulnerabilities in cloud environments and how attackers exploit them. From resource exhaustion to account takeover, you’ll learn techniques used to target cloud services and how to identify misconfigurations that leave systems vulnerable.

涵盖的内容

2个视频1个作业

In this module, we will cover specialized and fragile systems, including mobile devices, virtual environments, and ICS networks. You’ll learn how to identify and exploit vulnerabilities in these complex systems and gain hands-on experience in securing mobile applications and virtualized environments.

涵盖的内容

3个视频1个作业

In this module, we’ll explore social engineering and physical attacks, teaching you how to manipulate human behavior to gain unauthorized access to systems and data. You’ll also gain insights into physical security weaknesses and learn techniques to bypass physical defenses and access sensitive information.

涵盖的内容

5个视频1个作业

In this module, we will focus on post-exploitation techniques, covering methods to maintain access and move laterally across networks after gaining entry. You'll also explore tools for maintaining stealth and persistence, ensuring that your access remains undetected throughout the engagement.

涵盖的内容

7个视频1个作业

In this module, we will cover post-engagement activities such as report writing, mitigation strategies, and system clean-up. You will learn how to deliver comprehensive reports and suggest practical solutions for improving security, ensuring the client can take actionable steps based on your findings.

涵盖的内容

9个视频1个作业

In this module, we will introduce the use of scripting and code analysis in penetration testing. You will explore how to use scripting languages like Bash, Python, and Ruby to automate tasks, and dive into code analysis tools and libraries to improve your testing methodology.

涵盖的内容

14个视频1个作业

In this module, we will dive into a comprehensive toolkit for penetration testers. From Nmap and Metasploit to Burp Suite and Wireshark, you’ll learn how to effectively use these tools to perform a variety of testing tasks, helping you enhance your skills and efficiency as an ethical hacker.

涵盖的内容

17个视频3个作业

位教师

Packt - Course Instructors
Packt
1,592 门课程 444,566 名学生

提供方

Packt

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题