CompTIA Pentest+

4.5/5

Businesses rely on a lot of technology to run smoothly, but they often don’t give thought to all the digital vulnerabilities in place that can cause threats or security risks if they aren’t taken care of and secured. Businesses of today use a plethora of digital tools courtesy of their IT department to keep things like data transfer, remote monitoring, a collaboration between co-workers and clients, etc at optimum efficiency. But if businesses do not have awareness regarding how this technology works or what it’s made up of in order to be able to assess whether there are any loopholes that could put your system or even people at risk for cyber attacks, then you are bound to fall victim which is why we find it crucial for entrepreneurs and business owners alike to hire someone who specializes in security – namely CompTIA Pentest+.

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Module 1: Planning and Scoping 

  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.

Module 2: Information Gathering and Vulnerability Identification 

  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyze vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialized systems

Module 3: Attacks and Exploits

  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summaries physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques

Module 4: Penetration Testing Tools

  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)

Module 5: Reporting and Communication 

  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

Audience Profile

  • Students preparing for the CompTIA PenTest+ (PT0-002) Certification Exam
  • Security Analysts
  • Penetration Testers
  • Vulnerability Testers
  • Network Security Operations
  • Application Security Vulnerability Testers

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Online Instructor Led

    Live, Online Training by top Instructors and practitioners across the globe.

    Onsite
    Training

    Conduct training at the work location you desired.

    Classroom Training

    The Venue will be ideally located and easy to access with covid-19 SOP's.

    Overseas Training

    Travel to any desired location for your training.

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients