Rated 9.3 out of 10 based on over 6784 reviews
What is the CompTIA PenTest+ Certification Training course?
It is the job of a penetration tester (pen tester) to demonstrate and record flaws in security. Typically, a pen tester will undertake reconnaissance, to find any vulnerabilities and exploit them in order to gain access and extract some data of value, proving the system is not 100% secure.
This CompTIA® PenTest+ course prepares you to be able to take and pass the new CompTIA PenTest+ PT0-001 certification exam.
Is the CompTIA PenTest+ Certification Training right for me?
This course has been designed for IT professionals looking to develop penetration testing skills, enabling them to identify vulnerabilities and effective remediation techniques.
To ensure you have success on this course, you should have:
You can obtain this level of skills and knowledge by taking the CompTIA Security+ Certification Training.
You should have 3-4 years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.
e-Careers has partnered with The Learning Tree, to offer a range of courses, delivered via high-tech classrooms or virtual learning, depending on your requirement.
We are an award-winning, established eLearning course provider, with over 16 years’ experience in the industry. We offer high-quality training courses at competitive prices.
What will I learn on this course?
Throughout the course you’ll be introduced to the general methodologies and concepts, which relate to penetration testing, and you’ll reinforce these concepts through simulated penetration tests for a fictitious company.
Among other topics, you’ll learn how to plan and scope penetration tests, conduct passive reconnaissance and exploit hoist-based vulnerabilities.
Module 1 – Introduction to Penetration Testing Concepts
Module 2 - Conducting Passive Reconnaissance
Module 3 – Performing Non-Technical Tests
Module 4 – Conducting Active Reconnaissance
Module 5 – Analysing Vulnerabilities
Module 6 – Penetrating Networks
Module 7 – Exploiting Host-Based Vulnerabilities
Module 8 – Testing Applications
Module 9 – Completing Post-Exploit Tasks
Module 10 – Analysing and Reporting Pen Test Results
Choose any one from a HP Laptop, Fitbit Versa 2 or Apple Airpods*.*Special terms and conditions apply to certain courses. See product page for details. View Deals
After the advice given by the Government, NHS and WHO, we have taken the appropriate measures to ensure the safety of all our delegates attending our classrooms and events. This has been, and always will be, our number one priority.
We wanted to reassure you that all our scheduled classrooms and events will still be running. However, we will be now be offering them Virtually.
This decision to move all learning to Virtual and to offer support remotely has been taken to protect delegates and trainers. This allows delegates to continue their learning and for trainers to maintain the same level of service.
Because the situation is changing daily, we will do our best to provide you with the most up-to-date information, and this will be communicated via our website or email.
For anyone with queries regarding classrooms you are about to attend, please contact us on email@example.com or +44 (0) 02 3198 7706.
Please stay safe.