CompTIA PenTest+ Certification Training
Continuing Education Credits
IT Professionals that want to further their with knowledge of Penetration Testing.
The CompTIA PenTest+ certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. PenTest+ assesses the most up-to-date penetration testing, vulnerability assessment and management skills necessary to determine the resiliency of a network against attacks.
PenTest+ covers network security, compliance and operation security, threats and vulnerabilities, application, data and host security, access control, identity management, and cryptography.
After you complete this course, you will be able to plan, conduct, analyze, and report on penetration tests.
- Plan and scope penetration tests.
- Conduct passive reconnaissance.
- Perform non-technical tests to gather information.
- Conduct active reconnaissance.
- Analyze vulnerabilities.
- Penetrate networks.
- Exploit host-based vulnerabilities.
- Test applications.
- Complete post-exploit tasks.
- Analyze and report pen test results.
While there are no required prerequisites, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a
technical, hands-on focus. A minimum of 3-4 years of hands-on information security or related experience is recommended.
Out PenTest+ Course includes one (1) CompTIA PenTest+ PT1-001 Exam Voucher. Voucher is valid for 12 months after the course at a Pearson VUE testing center.
- Description: The CompTIA PenTest+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
- Number of Questions: Maximum of 110 questions
- Type of Questions: Multiple choice and performance-based
- Length of Test: 165 Minutes
- Passing Score: 750 (on a scale of 100-900)
Lesson 1: Planning and Scoping Penetration Tests
- Introduction to Penetration Testing Concepts
- Plan a Pen Test Engagement
- Scope and Negotiate a Pen Test Engagement
- Prepare for a Pen Test Engagement
Lesson 2: Conducting Passive Reconnaissance
- Gather Background Information
- Prepare Background Findings for Next Steps
Lesson 3: Performing Non-Technical Tests
- Perform Social Engineering Tests
- Perform Physical Security Tests on Facilities
Lesson 4: Conducting Active Reconnaissance
- Scan Networks
- Enumerate Targets
- Scan for Vulnerabilities
- Analyze Basic Scripts
Lesson 5: Analyzing Vulnerabilities
- Analyze Vulnerability Scan Results
- Leverage Information to Prepare for Exploitation
Lesson 6: Penetrating Networks
- Exploit Network-Based Vulnerabilities
- Exploit Wireless and RF-Based Vulnerabilities
- Exploit Specialized Systems
Lesson 7: Exploiting Host-Based Vulnerabilities
- Exploit Windows-Based Vulnerabilities
- Exploit *nix-Based Vulnerabilities
Lesson 8: Testing Applications
- Exploit Web Application Vulnerabilities
- Test Source Code and Compiled Apps
Lesson 9: Completing Post-Exploit Tasks
- Use Lateral Movement Techniques
- Use Persistence Techniques
- Use Anti-Forensics Techniques
Lesson 10: Analyzing and Reporting Pen Test Results
- Analyze Pen Test Data
- Develop Recommendations for Mitigation Strategies
- Write and Handle Reports
- Conduct Post-Report-Delivery Activities