CompTIA PenTest+ - CTU Training Solutions
Loading...
ONLINE APPLICATION
×

CompTIA PenTest+

During this course, you will work your way through a simulated pen test for a fictitious company using a variety of tools. You will build on your existing security knowledge and experience to plan and conduct penetration tests using passive and active reconnaissance, analyse and exploit vulnerabilities, and tested applications. You will then finish up with some post-exploit tasks and analyse the results of the testing to create a report for a client.
Duration: 5 Days   |   Location : Online
Course Prerequisites:
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related ... Show More
Request A Quote View CompTIA Roadmap

Virtual Interactive Lecturer-led Teaching (VILT)

Virtual instruction environments are designed to simulate the traditional classroom or learning experience. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Course Content

Planning and scoping penetration tests

  • Introduction to penetration testing concepts
  • Plan a pen test engagement
  • Scope and negotiate a pen test engagement
  • Prepare for a pen test engagement

See fewer details

Conducting passive reconnaissance

  • Gather background information
  • Prepare background findings for next steps

+ See more details

Performing non-technical tests

  • Perform social engineering tests
  • Perform physical security tests on facilities

+ See more details

Conducting active reconnaissance

  • Scan Networks
  • Enumerate Targets
  • Scan for Vulnerabilities
  • Analyze basic scripts

+ See more details

Analyzing vulnerabilities

  • Analyse vulnerability scan results
  • Leverage information to prepare for exploitation

+ See more details

Penetrating networks

  • Exploit network-based vulnerabilities
  • Exploit wireless and RF-based vulnerabilities
  • Exploit specialized systems

+ See more details

Exploiting host-based vulnerabilities

  • Exploit Windows-based vulnerabilities
  • Exploit *nix-based vulnerabilities

+ See more details

Testing Applications

  • Exploit web application vulnerabilities
  • Test source code and compiled apps

+ See more details

Completing post-exploit tasks

  • Use lateral movement techniques
  • Use persistence techniques
  • Use anti-forensics techniques

+ See more details

Analysing and reporting pen test results

  • Analyse pen test data
  • Develop and recommendations for mitigation strategies
  • Write and handle reports
  • Conduct post-report-delivery activities

+ See more details

CTU Training Solutions , Updated: June 10th, 2020

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Open chat
1
Need Help?
Hello
How can we assist you today?