Login / Register

CompTIA PenTest+

During this course, you will work your way through a simulated pen test for a fictitious company using a variety of tools. You will build on your existing security knowledge and experience to plan and conduct penetration... Show More
Course Prerequisites:
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related ... Show More
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

5 Days

Course Content

Planning and scoping penetration tests

  • Introduction to penetration testing concepts
  • Plan a pen test engagement
  • Scope and negotiate a pen test engagement
  • Prepare for a pen test engagement

See fewer details

Conducting passive reconnaissance

  • Gather background information
  • Prepare background findings for next steps

+ See more details

Performing non-technical tests

  • Perform social engineering tests
  • Perform physical security tests on facilities

+ See more details

Conducting active reconnaissance

  • Scan Networks
  • Enumerate Targets
  • Scan for Vulnerabilities
  • Analyze basic scripts

+ See more details

Analyzing vulnerabilities

  • Analyse vulnerability scan results
  • Leverage information to prepare for exploitation

+ See more details

Penetrating networks

  • Exploit network-based vulnerabilities
  • Exploit wireless and RF-based vulnerabilities
  • Exploit specialized systems

+ See more details

Exploiting host-based vulnerabilities

  • Exploit Windows-based vulnerabilities
  • Exploit *nix-based vulnerabilities

+ See more details

Testing Applications

  • Exploit web application vulnerabilities
  • Test source code and compiled apps

+ See more details

Completing post-exploit tasks

  • Use lateral movement techniques
  • Use persistence techniques
  • Use anti-forensics techniques

+ See more details

Analysing and reporting pen test results

  • Analyse pen test data
  • Develop and recommendations for mitigation strategies
  • Write and handle reports
  • Conduct post-report-delivery activities

+ See more details

CTU Training Solutions , Updated: September 14th, 2018

Share with friends

Request a Quote

Your Name

Your Surname

Contact Number

Your Email


Which campus would you like to study at?

Your job title

Will your training be sponsored?


The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
0861 100 395
[email protected]


Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:

Contact Number:

Choose a campus