Catalog

CompTIA PenTest+

$2795.00

Course ID: CS-10074

Duration (Days): 5.0



Please contact us for additional details and scheduling options.

Contact Us
This course prepares IT professionals to take the CompTIA PenTest+ certification exam, equipping them with essential skills in penetration testing and vulnerability assessment. Participants will learn how to plan, conduct, and analyze security tests on systems and networks, gaining hands-on experience in identifying and addressing security vulnerabilities.
The CompTIA PenTest+ course is designed for IT professionals who want to enhance their skills in penetration testing and vulnerability assessment. This course prepares participants to pass the CompTIA PenTest+ certification exam by providing comprehensive training in planning, executing, and reporting on security assessments across various computing environments. Throughout the course, participants will learn to identify security vulnerabilities in networks, applications, and devices through hands-on exercises and real-world scenarios. The curriculum covers key topics such as vulnerability scanning, exploit development, post-exploitation techniques, and report writing. In addition, the course emphasizes the importance of ethical hacking and adherence to industry standards and regulations. By the end of the course, students will be equipped with the knowledge and skills needed to effectively perform penetration tests and contribute to the security posture of their organizations.

Course Outline

##### Domain 1 - Planning and Scoping - Compare and contrast governance, risk, and compliance concepts. - Explain the importance of scoping and organizational/customer requirements. - Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity. ##### Domain 2 - Information Gathering and Vulnerability Scanning - Given a scenario, perform passive reconnaissance. - Given a scenario, perform active reconnaissance. - Given a scenario, analyze the results of a reconnaissance exercise. - Given a scenario, perform vulnerability scanning. ##### Domain 3 - Attacks and Exploits - Given a scenario, research attack vectors and perform network attacks. - Given a scenario, research attack vectors and perform wireless attacks. - Given a scenario, research attack vectors and perform application-based attacks. - Given a scenario, research attack vectors and perform attacks on cloud technologies. - Explain common attacks and vulnerabilities against specialized systems. - Given a scenario, perform a social engineering or physical attack. - Given a scenario, perform post-exploitation techniques. ##### Domain 4 - Reporting and Communication - Compare and contrast important components of written reports. - Given a scenario, analyze the findings and recommend the appropriate remediation within a report. - Explain the importance of communication during the penetration testing process. - Explain post-report delivery activities. ##### Domain 5 - Tools and Code Analysis - Explain the basic concepts of scripting and software development. - Given a scenario, analyze a script or code sample for use in a penetration test. - Explain use cases of the following tools during the phases of a penetration test.