5/5

CompTIA PenTest+

5/5

CompTIA PenTest+

CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills and best practices required to customize assessment frameworks to effectively collaborate on and report findings, and communicate recommended strategies to improve the overall state of IT security.

PenTest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

 

Required Exam: PT0-002

 
Target Audience:
  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineer
 
Prerequisite:

While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures. Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.

Babu Varghese

Senior Cloud & Security Specialist

MCSE,RHCE,CCNP,CEH,CSA,CCSE,F5-CTS, AWS & Azure

Certified instructor with 20+ years of experience in the field of cloud and cybersecurity. Proven success in leveraging educational theories and methodologies to design, develop, and deliver successful training programs and integrate instructional technology to provide onsite and virtual training. Babu has helped IPRULERS in setting the bar for cloud and cyber security training and helping thousands of engineers to obtain their own certifications. He excels in corporate training and has excellent interpersonal skills that make him stand out. Babu has proven his knowledge and skills in delivering training for the Microsoft, Amazon, f5, Check Point, EC-Council, CompTIA & Cisco etc.

Duration

40 Hours

Modules

5

Skill Level

Beginner

Language

English

Certificate

Yes

Mode

Online/Offline

Share :

Course Curriculam

  • Explain the importance of planning for an engagement.
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
  • Given a scenario, conduct information gathering
  • using appropriate techniques.
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyze vulnerability scan results.
  • Explain the process of leveraging information
  • to prepare for exploitation.
  • Explain weaknesses related to specialized systems.
  • Compare and contrast social engineering attacks.
  • Given a scenario, exploit network-based vulnerabilities.
  • Given a scenario, exploit wireless and RF-based vulnerabilities.
  • Given a scenario, exploit application-based vulnerabilities.
  • Given a scenario, exploit local host vulnerabilities.
  • Summarize physical security attacks related to facilities.
  • Given a scenario, perform post-exploitation techniques.
  • Summarize physical security attacks related to facilities.
  • Given a scenario, perform post-exploitation techniques.
  • Given a scenario, use Nmap to conduct information gathering exercises.
  • Compare and contrast various use cases of tools.
  • Given a scenario, analyze tool output or
  • data related to a penetration test.
  • Given a scenario, analyze a basic script
  • (limited to Bash, Python, Ruby, and PowerShell).
  • Given a scenario, use report writing and handling best practices.
  • Explain post-report delivery activities.
  • Given a scenario, recommend mitigation
  • strategies for discovered vulnerabilities.
  • Explain the importance of communication
  • during the penetration testing process.

Download Course Brochure

For More details please download our brochure here.

OUR STUDENT SUCCESS
STORIES

“Mr. Gigi Vikraman has been very supportive and amazing person. His way of teaching is completely a different style than others where the one who get in depth knowledge about the products. If anyone dream the lucky number, I recommend Gigi.”

Dileep NR

CCIE Collaboration

“It was a great journey with IP Rulers for learning CCNP Enterprise. From the best guidance of Gigi Vikraman Sir, he is very helpful with exceptional teaching skill and he even make every complex topic very easy to understand which is really amazing. Thanks a lot.”

Akhil PJ

CCNP Enterprise

“This was one of the best Network training I have ever attended. The Institute, materials & facilitation was excellent. I recommend this training & Institute to all Network engineers who interested in seeing real progress in their professional carrier.
Thank you again IP Rulers.”

Priji Soman

CCNP Enterprise

Enquire Now

We are here to provide you with comprehensive assistance regarding all the details related to the courses and any other inquiries you may have. Please feel free to reach out to us for guidance and support. 

    Scroll to Top
    ×