• Online, Self-Paced
Course Description

Familiarize yourself with the various aspects of social engineering exploits and attacks, as well as specialized system attacks such as SCADA.

Learning Objectives

CompTIA PenTest+: Social Engineering and Specialized System Attacks

  • describe weaknesses in specialized systems
  • compare phishing attacks
  • specify elicitation exploits
  • define interrogation techniques
  • compare impersonation and hoaxing
  • describe shoulder surfing
  • describe USB key dropping
  • realize motivation techniques
  • choose the best software for a pentesting lab
  • configure a pentesting lab environment
  • describe social attacks and exploits

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Test and Evaluation
  • Vulnerability Assessment and Management