Rated 9.2 out of 10 based on over 6350 reviews
What is the CompTIA PenTest+ Certification Training course?
It is the job of a penetration tester (pen tester) to demonstrate and record flaws in security. Typically, a pen tester will undertake reconnaissance, to find any vulnerabilities and exploit them in order to gain access and extract some data of value, proving the system is not 100% secure.
This CompTIA® PenTest+ course prepares you to be able to take and pass the new CompTIA PenTest+ PT0-001 certification exam.
Is the CompTIA PenTest+ Certification Training right for me?
This course has been designed for IT professionals looking to develop penetration testing skills, enabling them to identify vulnerabilities and effective remediation techniques.
To ensure you have success on this course, you should have:
You can obtain this level of skills and knowledge by taking the CompTIA Security+ Certification Training.
You should have 3-4 years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.
e-Careers has partnered with The Learning Tree, to offer a range of courses, delivered via high-tech classrooms or virtual learning, depending on your requirement.
We are an award-winning, established eLearning course provider, with over 16 years’ experience in the industry. We offer high-quality training courses at competitive prices.
What will I learn on this course?
Throughout the course you’ll be introduced to the general methodologies and concepts, which relate to penetration testing, and you’ll reinforce these concepts through simulated penetration tests for a fictitious company.
Among other topics, you’ll learn how to plan and scope penetration tests, conduct passive reconnaissance and exploit hoist-based vulnerabilities.
Module 1 – Introduction to Penetration Testing Concepts
Module 2 - Conducting Passive Reconnaissance
Module 3 – Performing Non-Technical Tests
Module 4 – Conducting Active Reconnaissance
Module 5 – Analysing Vulnerabilities
Module 6 – Penetrating Networks
Module 7 – Exploiting Host-Based Vulnerabilities
Module 8 – Testing Applications
Module 9 – Completing Post-Exploit Tasks
Module 10 – Analysing and Reporting Pen Test Results