Skip to content

CompTIA PenTest+ (Ethical Hacking)
One Education

Accredited by CPD QS | Instant Access | Free Digital Certificate of Completion | 24/7 Tutor Support

Summary

Price
£19 inc VAT
Study method
Online
Duration
15 hours · Self-paced
Access to content
1 year
Qualification
No formal qualification
CPD
15 CPD hours / points
Additional info
  • Tutor is available to students

Overview

A combination of our "CompTIA PenTest+ (Ethical Hacking)" course and a thorough exploration of the field of ethical hacking. The material in this course trains prospective cybersecurity professionals with the fundamental abilities and information required to succeed in vulnerability assessment and penetration testing. The whole penetration test lifecycle—from planning and engagement to post-exploitation and reporting—will be covered. This training session covers a wide range of topics, including network-based assaults, cloud security, social engineering, and more, with a strong emphasis on practical skills. Get the knowledge and skills necessary to recognise and stop security threats, and get ready for the CompTIA PenTest+ certification.

Learn The Penetration Testing and Ethical Hacking:

  • Planning and Engagement
    Learn to develop effective penetration testing plans and conduct successful engagements with clients, ensuring comprehensive coverage and clear communication.
  • Information Gathering and Vulnerability Scanning
    Master the techniques of reconnaissance, information gathering, and vulnerability scanning to identify potential security weaknesses in various systems and networks.
  • Network-Based Attacks
    Understand and execute various network-based attacks, including exploiting vulnerabilities and using penetration testing tools to assess security posture.
  • Cloud Security and Fragile Systems
    Gain expertise in assessing cloud environments and specialised systems, understanding the unique challenges and techniques required for these platforms.
  • Post-Exploitation and Reporting
    Learn the critical steps involved in post-exploitation, including data analysis, reporting, and communication, to provide actionable insights and recommendations.

CPD

15 CPD hours / points
Accredited by CPD Quality Standards

Description

  • Understand the foundations of ethical hacking, including the importance of planning and engaging with clients professionally.
  • Learn to gather crucial information and conduct vulnerability scans to identify potential security risks in various systems.
  • Develop skills in executing network-based attacks and selecting the most effective penetration testing tools.
  • Gain insights into attacking cloud infrastructures and handling specialised systems with care.
  • Explore social engineering techniques and physical attack methods to test human and physical security controls.
  • Master the post-exploitation phase, including reporting findings and effectively communicating with stakeholders.

Course Curriculum:

  • Introduction
  • Module 01: Planning And Engagement
  • Module 02: Information Gathering And Vulnerability Scanning
  • Module 03: Network-Based Attacks
  • Module 04: Selecting Pen Testing Tools
  • Module 05: Tools And Programming
  • Module 06: Attacking The Cloud
  • Module 07: Specialised And Fragile Systems
  • Module 08: Social Engineering And Physical Attacks
  • Module 09: Post-Exploitation
  • Module 10: Post-Engagement Activities
  • Module 11: Reporting And Communication
  • Module 12: Tools Inventory

Who is this course for?

  • Individuals interested in ethical hacking and cybersecurity.
  • IT professionals seeking to enhance their security skills.
  • Network administrators want to learn penetration testing.
  • Cybersecurity enthusiasts aim to gain practical knowledge.
  • Students pursuing a career in cybersecurity and IT security.

Requirements

Participants should have foundational knowledge of IT security concepts and networking. A basic understanding of operating systems, networking protocols, and cybersecurity principles is essential. Familiarity with command-line interfaces and scripting languages is recommended. Prior experience in information security or related fields is beneficial.

Career path

  • Penetration Tester
  • Ethical Hacker
  • Network Security Specialist
  • Security Consultant and
  • Cybersecurity Analyst
  • IT Security Auditor

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2026. All rights reserved.