Latest News
  • Join CCNP Training Course & Get CCNA Absolutely FREE
  • Courses Available Both Online and Classroom
  • Best IT Networking Training Institute in Dubai

CompTIA PenTest+

CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.


PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills and best practices required to customize assessment frameworks to effectively collaborate on and report findings, and communicate recommended strategies to improve the overall state of IT security.

Course Details

PenTest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.


Required Exam: PT0-002

Target Audience:

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineer


While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.


Course outline

  • Explain the importance of planning for an engagement.
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.

  • Given a scenario, conduct information gathering
  • using appropriate techniques.
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyze vulnerability scan results.
  • Explain the process of leveraging information
  • to prepare for exploitation.
  • Explain weaknesses related to specialized systems.

  • Compare and contrast social engineering attacks.
  • Given a scenario, exploit network-based vulnerabilities.
  • Given a scenario, exploit wireless and RF-based vulnerabilities.
  • Given a scenario, exploit application-based vulnerabilities.
  • Given a scenario, exploit local host vulnerabilities.
  • Summarize physical security attacks related to facilities.
  • Given a scenario, perform post-exploitation techniques.
  • Summarize physical security attacks related to facilities.
  • Given a scenario, perform post-exploitation techniques.

  • Given a scenario, use Nmap to conduct information gathering exercises.
  • Compare and contrast various use cases of tools.
  • Given a scenario, analyze tool output or
  • data related to a penetration test.
  • Given a scenario, analyze a basic script
  • (limited to Bash, Python, Ruby, and PowerShell).

  • Given a scenario, use report writing and handling best practices.
  • Explain post-report delivery activities.
  • Given a scenario, recommend mitigation
  • strategies for discovered vulnerabilities.
  • Explain the importance of communication
  • during the penetration testing process.

Trainer's Profile

  • IP Rulers is managed by an expert team of trainers with over 12 years’ experience in the industry and in hands-on training.
  • All the trainers have multiple certifications in their respective areas of interest.
  • Individual trainers’ profiles can be provided upon request by email, along with demos and LinkedIn profiles.
  • Online and classroom demos are also available upon request.

Training Schedule

CompTIA Security+


Weekdays (Sun - Thu)

Weekend (Fri- Sat)


Classroom / Online

Classroom / Online


40 Hours

40 Hours


1 Month

2 Month



Training Type



3 April 2023

CompTIA Security+

Classroom / Online

Weekdays (Mon - Fri)

7 April 2023

CompTIA Security+

Classroom / Online

Weekend (Sat - Sun)


  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures. Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.


Call now