e-Careers

CompTIA PenTest+ Certification Training - Classroom

Trustpilot

Rated 9.2 out of 10 based on over 6350 reviews

Free course advice
Learn more about how we use your data

What is the CompTIA PenTest+ Certification Training course?

It is the job of a penetration tester (pen tester) to demonstrate and record flaws in security. Typically, a pen tester will undertake reconnaissance, to find any vulnerabilities and exploit them in order to gain access and extract some data of value, proving the system is not 100% secure.

This CompTIA® PenTest+ course prepares you to be able to take and pass the new CompTIA PenTest+ PT0-001 certification exam.

Available delivery methods for this course
Classroom

Classroom

Group booking

Group booking

Key features of the course

  • Delivery Method: Classroom
  • Exam: Included
  • Mock Exams Included
  • Tutor Support Included
  • Duration: 5 Days

Browse classroom dates below

Filters

Course

Region

Location

Month

Location Date Duration Price Availability
LondonNov 25th 2019  5 Days£1,650 ex. VATAvailable
Enquire now
Book now
Live OnlineNov 25th 2019  5 Days£1,650 ex. VATAvailable
Enquire now
Book now
LondonMar 16th 2020  5 Days£1,650 ex. VATAvailable
Enquire now
Book now
Live OnlineMar 16th 2020  5 Days£1,650 ex. VATAvailable
Enquire now
Book now

Is the CompTIA PenTest+ Certification Training right for me?

This course has been designed for IT professionals looking to develop penetration testing skills, enabling them to identify vulnerabilities and effective remediation techniques.

Prerequisites

To ensure you have success on this course, you should have:

  •        Intermediate knowledge of information security concepts (identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies)
  •        Practical experience within securing various computing environments

You can obtain this level of skills and knowledge by taking the CompTIA Security+ Certification Training.

You should have 3-4 years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.

e-Careers has partnered with The Learning Tree, to offer a range of courses, delivered via high-tech classrooms or virtual learning, depending on your requirement.

We are an award-winning, established eLearning course provider, with over 16 years’ experience in the industry.  We offer high-quality training courses at competitive prices.

What will I learn on this course?

Throughout the course you’ll be introduced to the general methodologies and concepts, which relate to penetration testing, and you’ll reinforce these concepts through simulated penetration tests for a fictitious company.

Among other topics, you’ll learn how to plan and scope penetration tests, conduct passive reconnaissance and exploit hoist-based vulnerabilities.

Module outline

Module 1 – Introduction to Penetration Testing Concepts

  •        Plan a Pen Test Engagement
  •        Scope and Negotiate a Pen Test Engagement
  •        Prepare for a Pen Test Engagement

Module 2 - Conducting Passive Reconnaissance

  •        Gather Background Information
  •        Prepare Background Findings for Next Steps

Module 3 – Performing Non-Technical Tests

  •        Perform Social Engineering Tests
  •        Perform Physical Security Tests on Facilities

Module 4 – Conducting Active Reconnaissance

  •        Scan Networks
  •        Enumerate Targets
  •        Scan for Vulnerabilities
  •        Analyse Basic Scripts

Module 5 – Analysing Vulnerabilities

  •        Analyse Vulnerability Scan Results
  •        Leverage Information to Prepare for Exploitation

Module 6 – Penetrating Networks

  •        Exploit Network-Based Vulnerabilities
  •        Exploit Wireless and RF-Based Vulnerabilities
  •        Exploit Specialised Systems

Module 7 – Exploiting Host-Based Vulnerabilities

  •        Exploit Windows-Based Vulnerabilities
  •        Exploit *Nix-Based Vulnerabilities

Module 8 – Testing Applications

  •        Exploit Web Application Vulnerabilities
  •        Test Source Code and Compiled Apps

Module 9 – Completing Post-Exploit Tasks

  •        Use Lateral Movement Techniques
  •        Use Persistence Techniques
  •        Use Anti-Forensics Techniques

Module 10 – Analysing and Reporting Pen Test Results

  •        Analyse Pen Test Data
  •        Develop Recommendations for Mitigation Strategies
  •        Write and Handle Reports
  •        Conduct Post-Report-Delivery Activities

We’re trusted by

Individuals, small businesses and large corporations who have used e-Careers since 2001. Here are some names you’ll recognise:

Maersk
Cambridge
Saatchi & Saatchi
NHS
American Express
DMI

Do you know someone who’d love this course? Tell them about it...