Instructor

CompTIA PenTest+ Training | Get Certified in Penetration Testing

Curriculum

Get hands-on CompTIA PenTest+ training & certification to master penetration testing, vulnerability assessment & ethical hacking. Enroll now & advance your career!

Ratings

( 4.6 Ratings )

Live Online Classes starting on 01 January, 1970

CompTIA PenTest+

The CompTIA PenTest+ (PT0-002) course is a thorough training program designed for cybersecurity professionals aiming to enhance their penetration testing skills. This course prepares learners for the PenTest+ certification by covering essential techniques and methodologies used to evaluate and improve IT system security.

By completing this course and earning the CompTIA PenTest+ certification, learners validate their ability to identify, exploit, and report on vulnerabilities in diverse IT environments, establishing themselves as proficient penetration testers.

 

Course Prerequisites

To maximize the benefits of the CompTIA PenTest+ (PT0-002) course, the following prerequisites are recommended:

  • Basic understanding of network technologies, including the OSI model, TCP/IP, and common networking devices.

  • Familiarity with operating systems (Windows, Linux, MacOS) and command-line interfaces.

  • Knowledge of information security principles, including confidentiality, integrity, availability (CIA), common threats, and basic defenses.

  • Experience with firewall and intrusion detection/prevention systems is beneficial but not required.

  • Basic knowledge of scripting or programming languages (e.g., Python, Bash) is helpful but not necessary.

  • At least two years of experience in information security or related roles is recommended; however, individuals with less experience but strong IT and security foundations may also succeed.

  • Completion of the CompTIA Security+ certification or equivalent knowledge is highly recommended for a solid understanding of security fundamentals.

 

Target Audience

The CompTIA PenTest+ (PT0-002) course is designed for:

  • Penetration Testers

  • Security Consultants

  • Vulnerability Assessment Analysts

  • Network Security Specialists

  • Application Security Vulnerability Analysts

  • Security Operations Center (SOC) Analysts

  • Ethical Hackers

  • Cybersecurity Engineers

  • Information Security Analysts

  • IT Auditors

  • Systems Administrators/Engineers with a focus on security

  • Cyber Defense Analysts

  • Cloud Security Specialists

  • Compliance and Operational Security Personnel

  • Technical Support Specialists aiming to advance their cybersecurity knowledge

  • Professionals preparing for the CompTIA PenTest+ certification exam

 

Course Outline

Module 1: Introduction to Ethical Hacking and Penetration Testing

  • Understanding Ethical Hacking and Penetration Testing

  • What is the Difference Between Ethical Hacking and Nonethical Hacking?

  • Understanding the Current Threat Landscape

  • Exploring Penetration Testing Methodologies

  • Penetration Testing Methods

Module 2: Planning and Scoping a Penetration Testing Assessment

  • Explaining the Importance of the Planning and Preparation Phase

  • Understanding the Legal Concepts of Penetration Testing

  • Learning How to Scope a Penetration Testing Engagement Properly

  • Learning the Key Aspects of Compliance-Based Assessments

Module 3: Information Gathering and Vulnerability Identification

  • Understanding Information Gathering and Reconnaissance

  • Understanding the Art of Performing Vulnerability Scans

  • Understanding How to Analyze Vulnerability Scan Results

Module 4: Social Engineering Attacks

  • Understanding Social Engineering Attacks

  • Phishing

  • Pharming

  • Malvertising

  • Spear Phishing

  • SMS Phishing

  • Voice Phishing

  • Whaling

  • Elicitation, Interrogation, and Impersonation (Pretexting)

  • Social Engineering Motivation Techniques

  • Shoulder Surfing

  • USB Key Drop and Social Engineering

Module 5: Exploiting Wired and Wireless Networks

  • Exploiting Network-Based Vulnerabilities

  • Exploiting Wireless and RF-Based Attacks and Vulnerabilities

Module 6: Exploiting Application-Based Vulnerabilities

  • Overview of Web Applications for Security Professionals

  • How to Build Your Own Web Application Lab

  • Exploiting Authentication-Based Vulnerabilities

  • Exploiting Authorisation-Based Vulnerabilities

  • Understanding Cross-Site Scripting (XSS) Vulnerabilities

  • Understanding Cross-Site Request Forgery Attacks

  • Understanding Clickjacking

  • Exploiting Security Misconfigurations

  • Exploiting File Inclusion Vulnerabilities

  • Exploiting Insecure Code Practices

Module 7: Exploiting Local Host and Physical Security Vulnerabilities

  • Exploiting Local Host Vulnerabilities

  • Understanding Physical Security Attacks

Module 8: Performing Post-Exploitation Techniques

  • Maintaining Persistence After Compromising a System

  • Understanding How to Perform Lateral Movement

  • Understanding How to Cover Your Tracks and Clean Up Systems After a Penetration Testing Engagement

Module 9: Penetration Testing Tools

  • Understanding the Different Use Cases of Penetration Testing Tools and How to Analyze Their Output

  • Penetration Testing–Focused Linux Distributions

  • Common Tools for Reconnaissance and Enumeration

  • Encapsulation and Tunneling Using DNS and Other Protocols Like NTP

  • Common Decompilation, Disassembling, and Debugging Tools

  • Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements

Module 10: Understanding How to Finalize a Penetration Test

  • Explaining Post-Engagement Activities

  • Surveying Report Writing Best Practices

  • Understanding the Importance of a Quality Report

  • Discussing Best Practices of Writing a Penetration Testing Report

  • Understanding Report Handling and Communications Best Practices

(4.6 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications