Starts | Register |
---|---|
Nov 13, 2023 9:00AM | |
May 13, 2024 9:00AM | |
Feb 19, 2024 9:00AM |
CompTIA Penetration Testing Certification (PenTest+) – (Exam PT0-002)
5 Days | Price: $3,295
As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-002.
PenTest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
This course may earn a Credly Badge.
Learning Objectives
This course will prepare students for the CompTIA PenTest+ (PT0-002) exam and verify the successful candidate has the knowledge and skills required to:
- Plan and scope a penetration testing engagement
- Understand legal and compliance requirements
- Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results
- Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations
Course Details
Course Outline
1 - Scoping Organizational/Customer Requirements
2 - Defining the Rules of Engagement
3 - Footprinting and Gathering Intelligence
4 - Evaluating Human and Physical Vulnerabilities
5 - Preparing the Vulnerability Scan
6 - Lesson 6: Scanning Logical Vulnerabilities
7 - Analyzing Scanning Results
8 - Avoiding Detection and Covering Tracks
9 - Exploiting the LAN and Cloud
10 - Testing Wireless Networks
11 - Targeting Mobile Devices
12 - Attacking Specialized Systems
13 - Web Application-Based Attacks
14 - Performing System Hacking
15 - Scripting and Software Development
16 - Leveraging the Attack: Pivot and Penetrate
17 - Communicating During the PenTesting Process
18 - Summarizing Report Components
19 - Recommending Remediation
20 - Performing Post-Report Delivery Activities
Actual course outline may vary depending on offering center. Contact your sales representative for more information.