CompTIA PenTest+ Certification Prep Course
- Código del Curso G015
- Duración 5 días
- Versión PT0-003
Otros Métodos de Impartición
Salta a:
Método de Impartición
Este curso está disponible en los siguientes formatos:
-
Cerrado
Cerrado
-
Clase de calendario
Aprendizaje tradicional en el aula
-
Aprendizaje Virtual
Aprendizaje virtual
Solicitar este curso en un formato de entrega diferente.
Temario
Parte superiorMaster the tools, techniques, and mindset of a professional penetration tester with hands-on training aligned to the CompTIA PenTest+ (PT0-003) exam
Pentest+ Certification Prep is designed to help learners confidently prepare for the CompTIA PenTest+ (PT0-003) exam, which validates the skills required to perform penetration testing and vulnerability management in a variety of IT environments. This course emphasizes hands-on, performance-based learning, guiding students through the full penetration testing process—from planning and scoping to exploitation and reporting. It’s ideal for cybersecurity professionals who want to deepen their offensive security expertise and earn a globally recognized credential.
Students will explore the five domains covered in the PT0-003 exam: Planning and Scoping, Information Gathering and Vulnerability Identification, Attacks and Exploits, Reporting and Communication, and Tools and Code Analysis. Through practical labs, real-world scenarios, and exam-focused instruction, learners will gain experience using industry-standard tools and techniques to identify and exploit vulnerabilities, analyze systems, and communicate findings effectively. The course also reinforces ethical and legal considerations, ensuring students are prepared to operate responsibly in professional environments.
Whether you're pursuing a career as a penetration tester, vulnerability analyst, or security consultant, this course provides the structure and support needed to succeed on the PT0-003 exam and beyond. With updated content reflecting the latest threats and technologies, learners will be equipped to meet the demands of today’s cybersecurity landscape.
Calendario
Parte superior-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 19-23 enero, 2026 | 10:30 AM to 6:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Inglés
-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 02-06 marzo, 2026 | 9:00 AM to 5:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Español
-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 16-20 marzo, 2026 | 9:00 AM to 5:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Inglés
-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 18-22 mayo, 2026 | 10:30 AM to 6:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Inglés
-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 29 junio-03 julio, 2026 | 9:00 AM to 5:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Inglés
-
- Método de Impartición: Aprendizaje Virtual
- Fecha: 27-31 julio, 2026 | 9:00 AM to 5:00 PM
- Sede: Aula Virtual (W. Europe )
- Idioma: Español
Dirigido a
Parte superiorThis course is best suited for IT and cybersecurity professionals who have foundational knowledge of network and system security and are looking to advance into offensive security roles. Learners are typically hands-on, analytical, and eager to develop practical skills in penetration testing, vulnerability assessment, and ethical hacking to enhance their career prospects or prepare for more advanced certifications.
Relevant Job Roles:
- Penetration Tester
- Vulnerability Analyst
- Security Consultant
- Red Team Member
- SOC Analyst (with offensive security focus)
- Cybersecurity Specialist
- Network Security Engineer
- Ethical Hacker
Objetivos del Curso
Parte superior- Plan and scope penetration tests while ensuring compliance with legal and ethical requirements, and develop detailed reports with remediation recommendations to support engagement management.
- Perform active and passive reconnaissance, gather information, and enumerate systems to uncover vulnerabilities effectively.
- Conduct vulnerability scans, analyze results, and validate findings to identify and address security weaknesses.
- Execute network, host-based, web application, and cloud-based attacks using appropriate tools and techniques to test system defenses.
- Maintain persistence, perform lateral movement, and document findings to support remediation efforts during post-exploitation activities.
Contenido
Parte superior- Lesson 1: Scoping Organizational/Customer Requirements
- Lesson 2: Defining the Rules of Engagement
- Lesson 3: Footprinting and Gathering Intelligence
- Lesson 4: Evaluating Human and Physical Vulnerabilities
- Lesson 5: Preparing the Vulnerability Scan
- Lesson 6: Scanning Logical Vulnerabilities
- Lesson 7: Analyzing Scanning Results
- Lesson 8: Avoiding Detection and Covering Tracks
- Lesson 9: Exploiting the LAN and Cloud
- Lesson 10: Testing Wireless Networks
- Lesson 11: Targeting Mobile Devices
- Lesson 12: Attacking Specialized Systems
- Lesson 13: Web Application-Based Attacks
- Lesson 14: Performing System Hacking
- Lesson 15: Scripting and Software Development
- Lesson 16: Leveraging the Attack: Pivot and Penetrate
- Lesson 17: Communicating During the PenTesting Process
- Lesson 18: Summarizing Report Components
- Lesson 19: Recommending Remediation
- Lesson 20: Performing Post-Report Delivery Activities
Pre-requisitos
Parte superiorTo ensure your success in this course, you should have:
- Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
- Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.