Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CompTIA PenTest+

New – Learn methodologies related to pen testing, allowing you to work through a simulated pen test for a fictitious company.

GK# 100213

Course Overview

TOP

As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.

This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001 and includes an exam voucher, study guide, and practice exams.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Limited Time Offer: This course is 25% off! Use promo code 25GTR at checkout.
  • Access Period:

$

Class is Full
This session is full. Please select a different session.

What You'll Learn

TOP
  • Plan and scope penetration tests
  • Conduct passive reconnaissance
  • Perform non-technical tests to gather information
  • Conduct active reconnaissance
  • Analyze vulnerabilities
  • Penetrate networks
  • Exploit host-based vulnerabilities
  • Test applications
  • Complete post-exploit tasks
  • Analyze and report penetration test results

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

  • Lesson 1: Planning and Scoping Penetration Tests
  • Lesson 2: Conducting Passive Reconnaissance
  • Lesson 3: Performing Non-Technical Tests
  • Lesson 4: Conducting Active Reconnaissance
  • Lesson 5: Analyzing Vulnerabilities
  • Lesson 6: Penetrating Networks
  • Lesson 7: Exploiting Host-Based Vulnerabilities
  • Lesson 8: Testing Applications
  • Lesson 9: Completing Post-Exploit Tasks
  • Lesson 10: Analyzing and Reporting Pen Test Results

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results

Prerequisites

TOP

To ensure your success in this course, you should have:

  • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
  • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

Who Should Attend

TOP
  • Penetration Tester 
  • Vulnerability Tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability

 

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience live, expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Request this course in a different delivery format.
Enroll