-
Course
- Security
Post-exploitation and Lateral Movements for CompTIA Pentest+
This course teaches you how to establish persistence, execute lateral movements, exfiltrate data, and perform cleanup operations, preparing you for the CompTIA PenTest+ exam.
What you'll learn
Post-exploitation techniques are critical for maintaining access, moving laterally, and extracting data in a controlled and ethical penetration testing engagement. In this course, Post-exploitation and Lateral Movements for CompTIA PenTest+, you’ll gain the skills required to effectively navigate compromised environments. First, you’ll learn how to establish and maintain persistence using scheduled tasks, command-and-control frameworks, and rootkits. Next, you’ll explore lateral movement techniques, such as pivoting, service enumeration, and credential dumping, using tools like Mimikatz and Impacket. Finally, you’ll cover staging and exfiltration methods, as well as cleanup and restoration activities to revert changes and preserve evidence. By the end of this course, you’ll have the knowledge to execute post-exploitation techniques responsibly and effectively, fully preparing you for the CompTIA PenTest+ certification exam.
Table of contents
About the author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
More Courses by Dale