Online Training
CompTIA Pentest+ Self-Paced eLearning
Secure Your Future: Elevate Your Career
Ongoing
Self-Paced eLearning
Next intake: Ongoing | Self-Paced eLearning
Overview
In an age where cyber threats evolve with alarming speed, the ability to not only defend but proactively attack these threats through ethical hacking and penetration testing has become invaluable. The CompTIA PenTest+ certification empowers IT professionals with the advanced skills and knowledge needed to conduct effective penetration testing and vulnerability assessments across a variety of systems, all while ensuring the resilience of networks against cyber threats.
Designed to bridge the gap between foundational cybersecurity knowledge and the hands-on application of penetration testing skills, CompTIA PenTest+ equips candidates with the ability to identify, exploit, report, and manage vulnerabilities on a network. This certification goes beyond traditional penetration testing to include management skills necessary for planning, scoping, and managing weaknesses, not just exploiting them.
Key aspects covered in the PenTest+ certification include understanding legal and compliance requirements, conducting penetration tests and vulnerability assessments using the latest tools and techniques, and effectively communicating findings to stakeholders. PenTest+ prepares cybersecurity professionals to step into roles that directly influence the protection and defense mechanisms of their organizations.
Earning the CompTIA PenTest+ certification positions you as a leader in the cybersecurity field, capable of addressing complex security vulnerabilities with proficiency and confidence. Whether you’re aspiring to become a penetration tester, security consultant, or any role requiring deep security knowledge, PenTest+ is your next step towards mastering the art of ethical hacking and network defense.
Course Inclusions
Ensure you are 100% ready on test day with comprehensive online training for PenTest+, only from CompTIA.
CertMaster Learn is interactive and self-paced, and combines instructional lessons with assessments, videos, and performance-based questions to help you prepare for your certification exam and career in IT.
In addition, you will also have CertMaster Labs for PenTest+ provides you with the necessary platform to gain critical hands-on experience:
- Plan and scope a penetration testing engagement
- Perform vulnerability scanning and penetration testing
- Produce a written report containing proposed remediation techniques in preparation for your CompTIA PenTest+ certification exam
Exclusive CertMaster Learn + Labs features that help you prepare for your exam:
- Countdown calendar to keep you on pace
- Narrative instruction, images, videos, and games to keep you engaged
- Achievement badges, flashcards, and a personalized dashboard to track progress
- PBQs and practice questions show what you’ve mastered and what to revisit
Who Should Attend?
Learning Outcomes
Online Training
CompTIA Pentest+ Self-Paced eLearning
Session details
- 100% coverage of exam objectives that focus on job roles
- Over 40 hours of engaging content
- 10 lessons with interactive performance-based questions
Level: Intermediate
Some familiarity with topic is recommended
Key Sessions
Planning and Scoping
- Understand legal and regulatory implications to ensure compliance during penetration testing.
- Define the scope and objectives of penetration tests, including identifying key stakeholders and establishing communication protocols.
- Evaluate governance, risk, and compliance (GRC) concepts relevant to penetration testing and organizational security.
- Demonstrate an ethical hacking mindset with a focus on integrity, confidentiality, and availability of data.
- Prepare engagement contracts that define the boundaries and limitations of the penetration test.
Information Gathering and Vulnerability Scanning
- Perform passive and active reconnaissance to gather information on targets without being detected.
- Utilise various vulnerability scanning tools and techniques to identify vulnerabilities within systems and networks.
- Analyse the output from reconnaissance and vulnerability scans to prioritize targets for further exploitation.
- Understand the role of vulnerability management programs in identifying and mitigating vulnerabilities.
- Conduct social engineering tests to gather additional information or gain access to systems.
Attacks and Exploits
- Execute network-based attacks, including exploiting misconfigurations and vulnerabilities in network services.
- Conduct wireless and application-based attacks to penetrate Wi-Fi networks and web applications.
- Utilise social engineering techniques for manipulation and gaining unauthorized access.
- Perform post-exploitation techniques to maintain access, escalate privileges, and gather more sensitive information.
- Explore vulnerabilities in cloud technologies and execute attacks tailored to cloud-based environments.
Reporting and Communication
- Analyse penetration testing findings to identify critical vulnerabilities and their impact on the organization.
- Develop comprehensive penetration testing reports that detail the findings, methodologies, and outcomes of the test.
- Communicate effectively with stakeholders, including technical staff and senior management, to explain the risks and necessary remediations.
- Recommend remediation strategies for identified vulnerabilities to improve the organization’s security posture.
- Address legal and compliance issues in reports to ensure the organization understands its regulatory obligations.
Tools and Code Analysis
- Identify and use various tools and technologies throughout the phases of a penetration test, including reconnaissance, scanning, exploitation, and post-exploitation.
- Analyse scripts and code samples for malicious content or vulnerabilities that could be exploited.
- Understand the applications and limitations of penetration testing tools to select the most effective ones for each phase of the test.
- Explain the use cases for scripting in the automation of tasks during a penetration test.
- Evaluate the security of scripts and coded applications as part of the overall security assessment of an organization.
Register Today
Join this training for professionals working within the Public Sector
Additional discounts are available for group registrations of 10 or more. For group or payment enquiries or custom training solutions, please contact [email protected]
Customised in-house options available for teams
Interested in any of our online trainings?
You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.
Enquire here for more informationCan't see what you need?
Download our training catalogue to review all available topics
Download full catalogue