Login / Register

CompTIA PenTest+

During this course, you will work your way through a simulated pen test for a fictitious company using a variety of tools. You will build on your existing security knowledge and experience to plan and conduct penetration... Show More
Course Prerequisites:
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related ... Show More
Request a Quote View CompTIA Roadmap

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

4IR Ready

5 Days

Course Content

Planning and scoping penetration tests

  • Introduction to penetration testing concepts
  • Plan a pen test engagement
  • Scope and negotiate a pen test engagement
  • Prepare for a pen test engagement

See fewer details

Conducting passive reconnaissance

  • Gather background information
  • Prepare background findings for next steps

+ See more details

Performing non-technical tests

  • Perform social engineering tests
  • Perform physical security tests on facilities

+ See more details

Conducting active reconnaissance

  • Scan Networks
  • Enumerate Targets
  • Scan for Vulnerabilities
  • Analyze basic scripts

+ See more details

Analyzing vulnerabilities

  • Analyse vulnerability scan results
  • Leverage information to prepare for exploitation

+ See more details

Penetrating networks

  • Exploit network-based vulnerabilities
  • Exploit wireless and RF-based vulnerabilities
  • Exploit specialized systems

+ See more details

Exploiting host-based vulnerabilities

  • Exploit Windows-based vulnerabilities
  • Exploit *nix-based vulnerabilities

+ See more details

Testing Applications

  • Exploit web application vulnerabilities
  • Test source code and compiled apps

+ See more details

Completing post-exploit tasks

  • Use lateral movement techniques
  • Use persistence techniques
  • Use anti-forensics techniques

+ See more details

Analysing and reporting pen test results

  • Analyse pen test data
  • Develop and recommendations for mitigation strategies
  • Write and handle reports
  • Conduct post-report-delivery activities

+ See more details

CTU Training Solutions , Updated: June 10th, 2020

Share with friends

Request a Quote

Your Name
Your Surname
Contact Number
Your Email
Which campus would you like to study at?
Your job title
Will your training be sponsored?
How did you hear about CTU?
The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free