Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)

Browse Categories

Browse Categories

CompTIA Pentest+

4.5/5

Businesses rely on a lot of technology to run smoothly, but they often don’t give thought to all the digital vulnerabilities in place that can cause threats or security risks if they aren’t taken care of and secured. Businesses of today use a plethora of digital tools courtesy of their IT department to keep things like data transfer, remote monitoring, a collaboration between co-workers and clients, etc at optimum efficiency. But if businesses do not have awareness regarding how this technology works or what it’s made up of in order to be able to assess whether there are any loopholes that could put your system or even people at risk for cyber attacks, then you are bound to fall victim which is why we find it crucial for entrepreneurs and business owners alike to hire someone who specializes in security – namely CompTIA Pentest+.

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Corporate Training Options

Online Instructor Led

2

Classroom Training

undraw_building_re_xfcm 1

Onsite Training

Overseas Training

Course Information

Module 1: Planning and Scoping 

  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.

Module 2: Information Gathering and Vulnerability Identification 

  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyze vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialized systems

Module 3: Attacks and Exploits

  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summaries physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques

Module 4: Penetration Testing Tools

  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)

Module 5: Reporting and Communication 

  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

Audience Profile

  • Students preparing for the CompTIA PenTest+ (PT0-002) Certification Exam
  • Security Analysts
  • Penetration Testers
  • Vulnerability Testers
  • Network Security Operations
  • Application Security Vulnerability Testers

Corporate Training Options

Online Instructor Led

Live, Online Training by top Instructors and practitioners across the globe.

Onsite
Training

Conduct training at the work location you desired.

Classroom Training

The Venue will be ideally located and easy to access with covid-19 SOP's.

Overseas Training

Travel to any desired location for your training.

Upcoming Batch

Enquiry Form:

What People say?

Mohammed Aljbreen Operation Specialist, SAMA

The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

    Not sure,
    which course to choose?

    Our Clients across the Globe!

    Our Corporate Clients

    Best Solution To Transform Your Corporate Envoirnment.

    Our Offices.

    UAE

    Office No- 306, Galadari Mazda Building Airport Road, Garhoud, Dubai.

    SPAIN

    C / Aribau 11 2-4 08913 Badalona Barcelona,
    Spain.

    UK

    85 Skeffington Road East Ham E6 2NA,
    London.

    AUS

    Level 22, HWT Tower, 40 City Road, Southbank, Melbourne VIC 3006.

    IN

    12B, Chitrapuri Hills, Hyderabad, Telangana
    India.