CompTIA PenTest+
Overview
The CompTIA PenTest+ is an instructor-led, hands-on certification training course. This course covers all exam topics, including planning and defining a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, as well as vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it provides participants with guidance on how to analyse the results and write a comprehensive report, including remediation techniques and best practices on how to effectively communicate the results to relevant stakeholders.
Companies conduct a large part of their activities virtually. This includes moving and storing information, monitoring teams remotely, and ensuring clear lines of communication between different stakeholders. For an organisation to operate efficiently and effectively, all digital activities must be safe and secure. CompTIA Pentest+ participants are able to rigorously assess potential areas that could be easily exploited by cyber threats or attacks. Participants wishing to demonstrate or validate their penetration testing skills should consider completing this certification.
This certification training course is available in Melbourne, Sydney, Brisbane, Australia and Live Virtually.
Learn More
Cities
Melbourne, Sydney, Brisbane, Adelaide, Canberra, Perth
Course Type
- Full-Time (Weekdays)
Days
- Monday to Friday
Time
- 9:30 am to 5:00 pm
Duration
- 5 days
Price
- $1849
Cities
Melbourne, Sydney, Brisbane, Adelaide, Canberra, Perth
Course Type
- Part-Time (Weeknights)
Days
- Mondays and Tuesdays
Time
- 6:00 pm to 9:00 pm
Duration
- 5 weeks
Price
- $1849
Cities
Melbourne, Sydney, Brisbane, Adelaide, Canberra, Perth
Course Type
- Part-Time (Weekends)
Days
- Saturdays only
Time
- 10:00 am to 5:00 pm
Duration
- 5 weeks
Price
- $1849
Available
Live Virtual Online
Have a team to train? We offer
In-House Training
Pre-requisites
- Basic to intermediate knowledge of various information security concepts, including but not limited to cryptography concepts and implementation, identity and access management (IAM), common security technologies, and computer networking concepts and implementation.
- Hands-on experience in securing a variety of computing environments, including small and medium-sized enterprises, as well as expert environments.
Exam
- Candidates can achieve this certification by passing the following exam(s).
- CompTIA PenTest+
- The certification exam can be registered and attempted within 3 months of course/module completion at our training centre on weekdays during normal business hours (excludes public holidays)
Books
- Course material for CompTIA PenTest+ provided
Delivery Method
- Instructor-led Classroom Training at our premises
- Live Virtual Online Training attend in real-time from anywhere
- In-House Training at your premises (4+ participants)
Skills Gained
- Assess the safety status of the company's environment and recommend as well as implement safety solutions.
- Monitor and ensure the security of hybrid environments, including cloud, mobile, and IoT.
- Operate with an awareness of applicable legislation and policies including governance, risk, and compliance principles.
- Identify, analyse and responsiveness to security events
Audience
- IT Professionals
- Information Security Professionals
- Cloud Computing Specialists
- Network Administrators
- System Administrators
- Penetration Testers
- Vulnerability Testers
- Application Security Analysts
- IT Security Analysts
- Cybersecurity Professionals
- IT Security Auditors
- Professionals who want to understand all CompTIA PenTest+ concepts and knowledge
- Individuals wishing to take the CompTIA PenTest+ PT0-002 certification exam
Learning Objectives
In this CompTIA PenTest+ certification course module participants will learn:
- Identifying and using different network services
- understand industry-standard testing tools
- Exploit web applications using today's most common vulnerabilities
- Understand Windows Active Directory and Kerberos attacks
- Use post-exploitation techniques (with Powerview, Bloodhound, and Mimikatz)
Course Outline
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyse tool output or data related to a penetration test
- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process