Have a Question About This Course?





    Image

    CompTIA PenTest+® Training

    CompTIA PenTest+® Certification
    The CompTIA PenTest+ training course is tailored to ready IT professionals for success in the PenTest+ PT0-002 certification exam while equipping them with the essential skills for proficient penetration testing. The curriculum encompasses planning, information gathering, executing attacks and exploits, as well as utilizing reporting tools and conducting code analysis. Participants are expected to possess intermediate-level knowledge of information security concepts along with practical experience in securing diverse computing environments.

    Successful completion of this course and passing the exam will result in the CompTIA PenTest+ certification.

    CompTIA PenTest+® Training Objectives

    • Planning and Scoping.
    • Information Gathering and Vulnerability Scanning.
    • Attacks and Exploits.
    • Reporting and Communication.
    • Tools and Code Analysis.

    Need Assistance Finding the Right Training Solution

    Our Consultants are here to assist you

    Key Point of Training Programs

    We have different work process to go step by step for complete our working process in effective way.
    • CompTIA PenTest+® Training Prerequisites

      To ensure your success in this course, you should have the following:

      Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and standard security technologies.
      Practical experience securing various computing environments, including small to medium businesses and enterprise environments.
      You can obtain this level of skills and knowledge by CompTIA Security+® Training.
      Individuals seeking the CompTIA PenTest+ certification should also have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.

      Certification Information

      You must take and pass the CompTIA PenTest+ certification exam to earn this certification. Exam vouchers are available upon request and included in the tuition fee.

    • CompTIA PenTest+® Training Format

      In-Person

      Online

    • CompTIA PenTest+® Training Outline

      Lesson 1: Planning and Scoping
      Planning and Scoping Compare and contrast governance, risk, and compliance concept
      Explain the importance of scoping and organisational/customer requirements
      Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity

      Lesson 2: Information Gathering and Vulnerability Scanning
      Given a scenario, perform passive reconnaissance
      Given a scenario, perform active reconnaissance
      Given a scenario, analyse the results of a reconnaissance exercise
      Given a scenario, perform vulnerability scanning

      Lesson 3: Attacks and Exploits
      Given a scenario, research attack vectors and perform network attacks
      Given a scenario, research attack vectors and perform wireless attacks
      Given a scenario, research attack vectors and perform application-based attacks
      Given a scenario, research attack vectors and perform attacks on cloud technologies
      Explain common attacks and vulnerabilities against specialised systems
      Given a scenario, perform a social engineering or physical attack
      Given a scenario, perform post-exploitation techniques

      Lesson 4: Reporting and Communication
      Compare and contrast important components of written reports
      Given a scenario, analyse the findings and recommend the appropriate remediation within a report
      Explain the importance of communication during the penetration testing process
      Explain post-report delivery activities

      Lesson 5: Tools and Code Analysis
      Tools and Code Analysis
      Given a scenario, analyse a script or code sample for use in a penetration test
      Explain the use cases of the following tools during the phases of a penetration test