This CompTIA® PenTest+ course will prepare you to pass the new CompTIA PenTest+ PT0-002 certification exam. It will also introduce you to the general concepts and methodologies related to penetration testing. Reinforce these concepts as you work your way through a simulated pen test for a fictitious company.
Passing the PenTest+ Certification Exam meets U.S. DoD Directive 8140/8570.01 CSSP Analyst, CSSP Incident Responder, CSSP Auditor, and CSSP Infrastructure Support.
CompTIA PenTest+ Certification Training Delivery Methods
CompTIA PenTest+ Certification Training Course Benefits
In this penetration testing training, you will learn the follow:
- Planning and Scoping
- Information Gathering and Vulnerability Scanning
- Attacks and Exploits
- Reporting and Communication
- Tools and Code Analysis
Prerequisites
You should have knowledge and skills at the level of Learning Tree course 446, CompTIA Security+® Training. Skills include:
- Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and standard security technologies.
- Practical experience in securing various computing environments, including small to medium businesses and enterprise environments.
Individuals seeking the CompTIA PenTest+ certification should also have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.
PenTest+ Instructor-Led Course Outline
- Planning and Scoping Compare and contrast governance, risk, and compliance concept
- Explain the importance of scoping and organizational/customer requirements
- Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
- Given a scenario, perform passive reconnaissance
- Given a scenario, perform active reconnaissance
- Given a scenario, analyze the results of a reconnaissance exercise
- Given a scenario, perform vulnerability scanning
- Given a scenario, research attack vectors and perform network attacks
- Given a scenario, research attack vectors and perform wireless attacks
- Given a scenario, research attack vectors and perform application-based attacks
- Given a scenario, research attack vectors and perform attacks on cloud technologies
- Explain common attacks and vulnerabilities against specialized systems
- Given a scenario, perform a social engineering or physical attack
- Given a scenario, perform post-exploitation techniques
- Compare and contrast essential components of written reports
- Given a scenario, analyze the findings and recommend the appropriate remediation within a report
- Explain the importance of communication during the penetration testing process
- Explain post-report delivery activities
- Tools and Code Analysis
- Given a scenario, analyze a script or code sample for use in a penetration test
- Explain the use cases of the following tools during the phases of a penetration test