Robust IT Ltd
Add to basket or enquireEnquire now
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the PT0-001 exam, while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are mostly Kali Linuxbased, covering a broad range of real-world examples used by penetration testers and red teams.
The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.
The new CompTIA PenTest+ exam is available now! Why is it different?
CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them.
PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
About the exam
- CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
- Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings.
- Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security.
CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
The topics in this course follow a natural real-world pentest engagement flow, as well as map to the exam objectives.
Module 1 - The Pen Test Engagement
In this module, you will learn how to work with a client and prepare for a penetration testing engagement. The topics are:
1. Penetration Testing Overview
2. Engagement Planning
3. Engagement Documents
4. Prepare to Go Live
Module 2 - Passive Reconnaissance
In this module, you will learn how to gather background information on your target. The topic is:
Module 3 - Active Reconnaissance
In this module, you will learn how to actively search for targets. The topics are:
1. Host Discovery and Port Scanning
3. Vulnerability Scanning
Module 4 - Physical Security
In this module, you will learn how to test physical security controls. The topic is:
1. Physical Security Tests
Module 5 - Social Engineering
In this topic, you will learn about social engineering. The topic is:
1. Social Engineering Attacks
Module 6 - Vulnerability Scan Analysis
In this module, you will learn how to examine vulnerability scan results to choose the best exploit against discovered targets. The topic is:
1. Vulnerability Scan Results
Module 7 - Password Cracking
In this module, you will learn the basics of password cracking. The topic is:
1. Password Cracking Types
Module 8 - Penetrating Wired Networks
In this module, you will learn how to penetrate a wired Ethernet network. The topic is:
1. Common Network Exploits
Module 9 - Penetrating Wireless Networks
In this module, you will learn how attack wireless networks. The topic is:
1. Wireless Network Exploits
Module 10 - Windows Exploits
In this module, you will learn how to exploit Windows hosts. The topics are:
1. Common Windows-Based Vulnerabilities
2. Password Cracking in Windows
3. Windows Components
4. Windows Accounts
Module 11 - Linux Exploits
In this module, you will learn how to hack Linux systems. The topics are:
1. Common Linux/Unix-Based Vulnerabilities
2. Password Cracking in Linux
3. Vulnerable Linux Components
4. Linux Accounts
Module 12 - Mobile Devices
In this module, you will learn how to attack mobile devices. The topics are:
1. Android Exploits
2. Apple Exploits
Module 13 - Specialized Systems
In this module, you will learn about specialized systems. The topics are:
2. Embedded Systems
3. 13.3 IoT
4. 13.4 Hardware Attacks
Module 14 - Scripts
In this module, you will learn the basics of scripting, as pertains to penetration testing. The topics are:
1. Scripting Basics
2. Common Scripting Elements
Module 15 - Application Testing
In this module you will learn about testing application code for vulnerabilities. The topics are:
1. Static Code Analysis
2. Dynamic Code Analysis
3. Reverse Engineering
Module 16 - Web App Exploits
In this module, you will learn how to exploit web apps. The topics are:
1. Common Web Application Vulnerabilities
2. Injection Attacks
3. Cross-Site Attacks
4. Other Web-Based Attacks
Module 17 - Lateral Movement
In this module, you will learn how to move around in a compromised network. The topic is:
1. Lateral Movement Techniques
Module 18 - Persistence
In this module, you will learn how to maintain control of a compromised system. The topics are:
1. Persistence Techniques
3. Bind and Reverse Shells
5. Scheduled Tasks
Module 19 - Cover Your Tracks
In this module, you will learn how to remove evidence of your hacking activities. The topic is:
1. Anti-forensics Techniques
Module 20 - The Report
In this module, you will learn how to analyze your pentest findings and write a report as the final deliverable for your client. The topics are:
1. Data Analysis
3. Writing the Report
4. Handling the Report
Module 21 - Post Engagement Cleanup
In this module, you will learn about the tasks you must perform after completing a professional penetration test. The topic is:
1. Post Engagement Activities
Who is this course for?
Earning the CompTIA PenTest+ demonstrates to others in your field that you have the penetration testing, vulnerability assessment, and management skills needed to assess a network's resiliency and enhance the overall security posture at an organization. In this course, boost your understanding of scanning and enumeration as you prepare for the Information Gathering & Vulnerability Identification domain of the CompTIA PenTest+ exam. Learn how to pinpoint the weak spots on a network using scanning and enumeration techniques, how to apply a structured approach to determine whether a target has a vulnerability present, and use Nmap scripts to map vulnerabilities to potential exploits. Plus, learn how to leverage a variety of powerful tools, including how to use Wireshark for information gathering and packet inspection.
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus
- Vulnerability tester.
- Security analyst (II line)
- Vulnerability assessment analyst.
- Network security operations.
- Application security vulnerability.
Questions and answers
Rating and reviews
There haven't been any reviews for this course yet.Leave a review
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.