CompTIA Pentest +
The PenTest+ course is designed for information security professionals who want to learn how to identify, exploit, report and manage vulnerabilities in a network, system or web application through which to troubleshoot and design more resilient systems. Thanks to this course the student will be able to plan and conduct a penetration test (including vulnerability assessment), understand the legal and compliance requirements, analyze the results and produce a written report with recovery procedures.
The course also prepares you for the  CompTIA PenTest+ PT0-002 vendor neutral international certification exam, an intermediate-level cybersecurity certification that verifies pen testing skills through the ability to conduct penetration testing and vulnerability assessments.
The course combines theory lessons   and  labs in virtual environments to best prepare you for the certification exam.
CODÂ : CompTIA Pentest +
Category : CompTIA
Teaching methodology
The course includes educational laboratories in which each student will be able to work in order to complete training exercises that will provide practical experience in using the instrument, for each of the topics covered during the course.
Prerequisites
Educational program
MODULO 1 – Planning and scoping
The student will be able to explain the importance of planning and key aspects of compliance-based assessments. You will learn techniques that highlight governance, risk and compliance, scoping and organizational/customer requirements, and demonstrate an ethical hacking mindset.
MODULO 2 – Information gathering and vulnerability identification
The student will be able to collect information, perform a vulnerability scan and analyze the results.
MODULO 3 – Attacks and exploits
The student will be able to exploit network, wireless, application and RF-based vulnerabilities, summarize physical security attacks and perform post-exploitation techniques.
MODULO 4 – Penetration testing tools
The student will be able to conduct information gathering exercises with various tools and analyze outputs and basic scripts (limited to: Bash, Python, Ruby, PowerShell).
MODULO 5 – Reporting & communication
The student will be able to draw up reports and manage the identified vulnerabilities based on best practices on the best mitigation strategies
Duration – 40 hours (8 days)
Delivery – in Classroom, On Site, Remote
PC and SW requirements:
- Internet connection
- Web browser, Google Chrome
- Zoom
Language
Instructor: English
Labs: English
Slides: English