CompTIA Penetration Testing Certification (PenTest+) - (Exam PT0-002)

Duration
5 Days
Price
1.550,00 €
Course Type
No Location
As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-002. PenTest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Learning Objectives

This course will prepare students for the CompTIA PenTest+ (PT0-002) exam and verify the successful candidate has the knowledge and skills required to:

  • Plan and scope a penetration testing engagement
  • Understand legal and compliance requirements
  • Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results
  • Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations

Course Outline

1 - Scoping Organizational/Customer Requirements
  • Topic 1A: Define Organizational PenTesting
  • Topic 1B: Acknowledge Compliance Requirements
  • Topic 1C: Compare Standards and Methodologies
  • Topic 1D: Describe Ways to Maintain Professionalism
2 - Defining the Rules of Engagement
  • Topic 2A: Assess Environmental Considerations
  • Topic 2B: Outline the Rules of Engagement
  • Topic 2C: Prepare Legal Documents
3 - Footprinting and Gathering Intelligence
  • Topic 3A: Discover the Target
  • Topic 3B: Gather Essential Data
  • Topic 3C: Compile Website Information
  • Topic 3D: Discover Open-Source Intelligence Tools
4 - Evaluating Human and Physical Vulnerabilities
  • Topic 4A: Exploit the Human Psyche
  • Topic 4B: Summarize Physical Attacks
  • Topic 4C: Use Tools to Launch a Social Engineering Attack
5 - Preparing the Vulnerability Scan
  • Topic 5A: Plan the Vulnerability Scan
  • Topic 5B: Detect Defenses
  • Topic 5C: Utilize Scanning Tools
6 - Lesson 6: Scanning Logical Vulnerabilities
  • Topic 6A: Scan Identified Targets
  • Topic 6B: Evaluate Network Traffic
  • Topic 6C: Uncover Wireless Assets
7 - Analyzing Scanning Results
  • Topic 7A: Discover Nmap and NSE
  • Topic 7B: Enumerate Network Hosts
  • Topic 7C: Analyze Output from Scans
8 - Avoiding Detection and Covering Tracks
  • Topic 8A: Evade Detection
  • Topic 8B: Use Steganography to Hide and Conceal
  • Topic 8C: Establish a Covert Channel
9 - Exploiting the LAN and Cloud
  • Topic 9A: Enumerating Hosts
  • Topic 9B: Attack LAN Protocols
  • Topic 9C: Compare Exploit Tools
  • Topic 9D: Discover Cloud Vulnerabilities
  • Topic 9E: Explore Cloud-Based Attacks
10 - Testing Wireless Networks
  • Topic 10A: Discover Wireless Attacks
  • Topic 10B: Explore Wireless Tools
11 - Targeting Mobile Devices
  • Topic 11A: Recognize Mobile Device Vulnerabilities
  • Topic 11B: Launch Attacks on Mobile Devices
  • Topic 11C: Outline Assessment Tools for Mobile Devices
12 - Attacking Specialized Systems
  • Topic 12A: Identify Attacks on the IoT
  • Topic 12B: Recognize Other Vulnerable Systems
  • Topic 12C: Explain Virtual Machine Vulnerabilities
13 - Web Application-Based Attacks
  • Topic 13A: Recognize Web Vulnerabilities
  • Topic 13B: Launch Session Attacks
  • Topic 13C: Plan Injection Attacks
  • Topic 13D: Identify Tools
14 - Performing System Hacking
  • Topic 14A: System Hacking
  • Topic 14B: Use Remote Access Tools
  • Topic 14C: Analyze Exploit Code
15 - Scripting and Software Development
  • Topic 15A: Analyzing Scripts and Code Samples
  • Topic 15B: Create Logic Constructs
  • Topic 15C: Automate Penetration Testing
16 - Leveraging the Attack: Pivot and Penetrate
  • Topic 16A: Test Credentials
  • Topic 16B: Move Throughout the System
  • Topic 16C: Maintain Persistence
17 - Communicating During the PenTesting Process
  • Topic 17A: Define the Communication Path
  • Topic 17B: Communication Triggers
  • Topic 17C: Use Built-In Tools for Reporting
18 - Summarizing Report Components
  • Topic 18A: Identify Report Audience
  • Topic 18B: List Report Contents
  • Topic 18C: Define Best Practices for Reports
19 - Recommending Remediation
  • Topic 19A: Employ Technical Controls
  • Topic 19B: Administrative and Operational Controls
  • Topic 19C: Physical Controls
20 - Performing Post-Report Delivery Activities
  • Topic 20A: Post-Engagement Cleanup
  • Topic 20B: Follow-Up Actions

Target Audience

Penetration Tester

Security Consultant

Cloud Penetration Tester

Cloud Security Specialist

Network & Security Specialist

Web App Penetration Tester

Information Security Engineer

Security Analyst

Please Note: some classes are run in multiple half-day sessions. Please contact us to confirm exact session dates/times.

Upcoming Class Dates and Times
Login