CompTIA Pentest+ (Plus) Certification Training Course - (PT0-001)

CompTIA Pentest+ Certification Training Course Overview

CompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

This course prepares you for Exam PT0-001. Test your current knowledge Qubits42

CompTIA Pentest+ (Plus) Certification Training Course - (PT0-001) (Duration : 40 Hours) Download Course Contents

Live Virtual Classroom
Group Training 1850
02 - 06 Aug 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 - 10 Sep 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR) 2100
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here Hire Our Trainers! Click here

Course Modules

Module 1 Planning and Scoping
  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
Module 2 Information Gathering and Vulnerability Identification
  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
Module 3 Attacks and Exploits
  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques
Module 4 Penetration Testing Tools
  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
Module 5 Reporting and Communication
  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process
Download Course Contents

Request More Information

Course Prerequisites
  • 3-4 years of hands-on information security or related experience
  • Network+, Security+, or equivalent knowledge

Upon Completion of this Course, you will accomplish following:-

  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
  • Conduct information gathering using appropriate techniques
  • Perform a vulnerability scan.
  • Analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
  • Compare and contrast social engineering attacks
  • Exploit network-based vulnerabilities
  • Exploit wireless and RF-based vulnerabilities
  • Exploit application-based vulnerabilities
  • Exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Perform post-exploitation techniques
  • Use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Analyse tool output or data related to a penetration test
  • Analyse a basic script (limited to Bash, Python, Ruby, and PowerShell) Reporting and Communication
  • Use report writing and handling best practices
  • Explain post-report delivery activities
  • Recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

Student Feedback  (Check Koenig Feedback on Trustpilot)

Q1 Say something about the Trainer? Q2 How is Koenig different from other training Companies? Q3 Will you come back to Koenig for training ?

Student Name Country Month Feedback Rating
Sulieman Abdulmalik Shaayef Yemen Feb-2020 A2. Koenig is one of the best institutions in the world. This institute has hundreds of IT-certified instructors. Koenig GOA center is well equipped, organized, and carefully designed. It provides the best environment for getting knowledge, also the manager and staff are very very kind and helpful. They work as a team and provide everything to trainees such (meals, tours, advice, etc.). Goa branch's staff are always smiling and reflect a bright image of the Koenig in particular and for India in general. My sincere thanks to the GOA branch's manager Mr.Rohit for his help and advice. Many more thanks also to all instructors who taught and advised me(Gajendra, Sunder, Nishant, Prabin). Many thanks to Mr. Tinku and Ramzan for their help. Thanks a lot, my brothers.