Skip to content
Computers

CompTIA Pentest+ (PT0-002)


Class
Javier Irizarry Riveiro
Contact us for the class schedule.
Contact us

The CompTIA PenTest+ course is an advanced program tailored to train individuals in the practices of systematic penetration testing and vulnerability assessment. This course equips participants with the skills necessary to conduct hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. Upon completion, students will be able to perform penetration tests using a comprehensive and repeatable process and prepare for the CompTIA PenTest+ certification exam, globally recognized as a standard of excellence in the field of penetration testing. This course is ideal for cybersecurity professionals, system and network analysts, and anyone interested in enhancing their knowledge of security through offensive measures.

/files/799524/CompTIA_Pentest_PT0-002_Syllabus.pdf

GENERAL OBJECTIVES

Throughout the course, students will engage in both theoretical learning and practical exercises that cover a broad range of topics related to ethical hacking and penetration testing. The curriculum includes:

  • Ethical Hacking Fundamentals: Understand ethical hacking principles, the penetration testing process, and legal compliance.
  • Planning and Scoping Penetration Tests: Learn to plan, scope, and manage vulnerabilities assessments and penetration tests.
  • Information Gathering and Vulnerability Identification: Techniques for effectively gathering data and identifying system vulnerabilities.
  • Attacks and Exploits: Execute network, application, and system exploitation techniques to evaluate security weaknesses.
  • Reporting and Communication: Develop comprehensive reports and communicate findings to enhance the security posture of the organization.
  • Tools and Scripting: Utilize various tools and scripting languages to automate tasks and improve testing efficiency.

 COURSE CONTENT

 Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

Here is the class outline:

1. Lesson 1: Scoping Organizational/Customer Requirements

2. Lesson 2: Defining the Rules of Engagement

3. Lesson 3: Footprinting and Gathering Intelligence

4. Lesson 4: Evaluating Human and Physical Vulnerabilities

5. Lesson 5: Preparing the Vulnerability Scan

6. Lesson 6: Scanning Logical Vulnerabilities

7. Lesson 7: Analyzing Scanning Results

8. Lesson 8: Avoiding Detection and Covering Tracks

9. Lesson 9: Exploiting the LAN and Cloud

10. Lesson 10: Testing Wireless Networks

11. Lesson 11: Targeting Mobile Devices

12. Lesson 12: Attacking Specialized Systems

13. Lesson 13: Web Application-Based Attacks

14. Lesson 14: Performing System Hacking

15. Lesson 15: Scripting and Software Development

16. Lesson 16: Leveraging the Attack: Pivot and Penetrate

17. Lesson 17: Communicating During the PenTesting Process

18. Lesson 18: Summarizing Report Components

19. Lesson 19: Recommending Remediation

20. Lesson 20: Performing Post-Report Delivery Activities

Back to top