Overview

CompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

This course prepares you for Exam PT0-001. Download Course Contents
Schedule & Prices
Course Details Schedule
Classroom Training*
Duration : 5 Days
Fee : Online : $1,800  (1-on-1), London : £2,500, Dubai : $2,600 , India : $1,800

March
02-06 (Birmingham)
02-06 (london)
02-06 (Manchester)
08-12 (Dubai)
09-13 (london)
April
06-10 (Birmingham)
06-10 (London)
06-10 (Manchester)
May
04-08 (Birmingham)
04-08 (London)
04-08 (Manchester)
June
01-05 (Birmingham)
01-05 (London)
01-05 (Manchester)
July
06-10 (london)
12-16 (Dubai)
13-17 (london)
Instructor-Led Online Training
Duration : 5 Days
Fee :  $1,800


March
02-06
08-12
09-13
April
06-10
May
04-08
June
01-05
July
06-10
12-16
13-17
Fly-Me-a-Trainer
Duration : 5 Days
Fee : On Request
Client's Location
As per mutual convenience

Enquire Now




Input symbols

Course Prerequisites

  • 3-4 years of hands-on information security or related experience
  • Network+, Security+, or equivalent knowledge


Upon Completion of this Course, you will accomplish following:-

  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
  • Conduct information gathering using appropriate techniques
  • Perform a vulnerability scan.
  • Analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
  • Compare and contrast social engineering attacks
  • Exploit network-based vulnerabilities
  • Exploit wireless and RF-based vulnerabilities
  • Exploit application-based vulnerabilities
  • Exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Perform post-exploitation techniques
  • Use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Analyse tool output or data related to a penetration test
  • Analyse a basic script (limited to Bash, Python, Ruby, and PowerShell) Reporting and Communication
  • Use report writing and handling best practices
  • Explain post-report delivery activities
  • Recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process
)