CompTIA PenTest+
- Description
- Reviews
COMPTIA PENTEST+
COURSE DESCRIPTION
CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.Â
SKILLS YOU WILL LEARN
- Plan and scope a penetration testing engagement
- Understand legal and compliance requirements
- Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results
- Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations
WHAT’S INCLUDED IN THE TRAINING
- E-Book
- Certification Exam Voucher
- Learning progress analytics and reporting
- Certified Best Trainer
- Official Lab 1 Year access
- Certificate of Training Completion
COURSE OUTLINE
-
Module 01: Scoping Organization/Customer Requirements
-
Module 02: Defining the Rules of Engagement
-
Module 03: Footprinting and Gathering Intelligence
-
Module 04: Evaluating Human and Physical Vulnerabilities
-
Module 05: Preparing the Vulnerability Scan
-
Module 06: Scanning Logical Vulnerabilities
- Module 07: Analyzing Scanning Results
- Module 08: Avoiding Detection and Covering Tracks
- Module 09: Exploiting the LAN and Cloud
- Module 10: Testing Wireless Networks
- Module 11: Targeting Mobile Devices
- Module 12: Attacking Specialized Systems
- Module 13: Web Application-Based Attacks
- Module 14: Performing System Hacking
- Module 15: Scripting and Software Development
- Module 16: Leveraging the Attack: Pivot and Penetrate
- Module 17: Communicating During the PenTesting Process
- Module 18: Summarizing Report Components
- Module 19: Recommending Remediation
- Module 20: Performing Post-Report Delivery Activities
INTEGRATED LABS
-
Assisted Lab: Exploring the Lab Environment
-
Assisted Lab: Gathering Intelligence
-
Assisted Lab: Performing Social Engineering using SET
-
Assisted Lab: Discovering Information using Nmap
-
Assisted Lab: Performing Vulnerability Scans and Analysis
-
Assisted Lab: Penetrating an Internal Network
-
Assisted Lab: Exploiting Web Authentication
-
Assisted Lab: Exploiting Weaknesses in a Website
-
Assisted Lab: Exploiting Weaknesses in a Database
-
Assisted Lab: Using SQL Injection
-
Assisted Lab: Performing an AitM Attack
-
Assisted Lab: Performing Password Attacks
-
Assisted Lab: Using Reverse and Bind Shells
-
Assisted Lab: Performing Post-Exploitation Activities
-
Assisted Lab: Establishing Persistence
-
Assisted Lab: Performing Lateral Movement
Please contact us for schedules and for booking a private class.
Popular Courses
Archive
Working hours
Monday | 9:00 am - 6.00 pm |
Tuesday | 9:00 am - 6.00 pm |
Wednesday | 9:00 am - 6.00 pm |
Thursday | 9:00 am - 6.00 pm |
Friday | 9:00 am - 6.00 pm |
Saturday | Closed |
Sunday | Closed |