In this series, we will take you through the material necessary to prepare for the CompTIA Pentest+ exam. Here we'll show you important and practical topics such as pentest pre-planning methods, legal concepts, and proper scoping tactics. We also take a look at a wide variety of pentesting tools like, Metasploit, Burp Suite, the Social Engineering Toolkit, Mimikatz, and Nmap. We then explain in detail, how pentesters discover sensitive data and gain access to remote systems using methods like SQL Injection, Cross-Site Scripting(XSS), Social Engineering, Man-in-the-Middle(MITM), Wireless attacks, Privilege Escalation, Post-exploitation, and others. Finally, we explore creating reports that will be presented to clients that reveal the findings of an engagement. Also we discuss mitigation and other post-report activities like cleanup of files/tools/shells, follow-ups, retests, and lessons learned.