COURSE INSIGHT

PenTest+ (PT0-001)is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

CompTIA PenTest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program.

While there is no required prerequisite, CompTIA Sec+ certification is recommended before taking the CompTIA Pentest+ exam.

Career Prospect

  • Penetration Tester
  • Vulnerability Tester
  • Security Analyst
  • Vulnerability Assessment Analyst
  • Network Security Operations

 

 

Learning Facilities

    • Classroom based Training
    • Highly experienced trainer
    • Labs kit, study material, exam
    • Continuous support after course

    CompTIA Pentest+ Course Contents

     

    Module 1 – Planning and Scoping Penetration Tests

    • Scope and Negotiate a Pen Test Engagement
    • Prepare for a Pen Test Engagement


    Module 2 – Conducting Passive Reconnaissance

    • Gather Background Information
    • Prepare Background Findings for Next Steps


    Module 3 – Performing Non-Technical Tests

    • Perform Social Engineering Tests
    • Perform Physical Security Tests on Facilities


    Module 4 – Conducting Active Reconnaissance

    • Scan Networks
    • Enumerate Targets
    • Scan for Vulnerabilities
    • Analyze Basic Scripts


    Module 5 – Analyzing Vulnerabilities

    • Analyze Vulnerability Scan Results
    • Leverage Information to Prepare for Exploitation


    Module 6 – Penetrating Networks

    • Exploit Network-Based Vulnerabilities
    • Exploit Wireless and RF-Based Vulnerabilities
    • Exploit Specialized Systems


    Module 7 – Exploiting Host-Based Vulnerabilities

    • Exploit Windows-Based Vulnerabilities
    • Exploit *Nix-Based Vulnerabilities


    Module 8 – Testing Applications

    • Exploit Web Application Vulnerabilities
    • Test Source Code and Compiled Apps


    Module 9 – Completing Post-Exploit Tasks

    • Use Lateral Movement Techniques
    • Use Persistence Techniques
    • Use Anti-Forensics Techniques


    Module 10 – Analyzing and Reporting Pen Test Results

    • Analyze Pen Test Data
    • Develop Recommendations for Mitigation Strategies
    • Write and Handle Reports