Skip to main content

ISBN10: 1260135950 | ISBN13: 9781260135954

ISBN10: 1260135950
ISBN13: 9781260135954
By Raymond Nutting

Step 1. Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ exam

Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive resource. Written by an expert penetration tester, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth answer explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

Covers all exam topics, including:

Pre-engagement activities

Getting to know your targets

Network scanning and enumeration

Vulnerability scanning and analysis

Mobile device and application testing

Social engineering

Network-based attacks

Wireless and RF attacks

Web and database attacks

Attacking local operating systems

Physical penetration testing

Writing the pen test report

And more

Online content includes:

Interactive performance-based questions 

Test engine that provides full-length practice exams or customized quizzes by chapter or by exam domain


Chapter 1: Pre-engagement Activities
Chapter 2: Getting to Know Your Targets
Chapter 3: Network Scanning and Enumeration
Chapter 4: Vulnerability Scanning and Analysis
Chapter 5: Mobile Device and Application Testing
Chapter 6: Social Engineering
Chapter 7: Network-based Attacks
Chapter 8: Wireless and RF Attacks
Chapter 9: Web and Database Attacks
Chapter 10: Attacking Local Operating Systems
Chapter 11: Physical Penetration Testing
Chapter 12: Writing the Pentest Report
Appendix A: Tools Reference

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top