Learn Ethical Hacking With a Clear, Step‑by‑Step Path.
Live, instructor-led training designed to prepare you for CompTIA PenTest+ and build real vulnerability assessment skills.
If you want security roles, you need more than “tools”—you need the workflow: how penetration tests are scoped, how targets are discovered, how vulnerabilities are validated, and how findings are reported clearly. This course gives you a structured, instructor-led path to learn ethical hacking fundamentals and prepare for PenTest+—without guessing what to study next.
Live, instructor-led online training
60 clock hours (PenTest+ pathway)
PenTest+ certification exam prep
Exam voucher + one retake included
Recorded sessions + support to stay on track
In 30 minutes, we’ll confirm fit, map your next step, and pick the best cohort—no pressure.
PENETRATION TESTING CERT PREP
Ethical Hacking Skills. One Certification Pathway.
PenTest+ is built for people who want to learn how vulnerabilities are actually found and validated—using a structured, professional process (not random “hacking tricks”).
This course gives you a clear, instructor-led path through penetration testing fundamentals—scoping, recon, scanning, validation, and reporting—so you can explain risk clearly and prove practical capability.
Career Outcomes
- Vulnerability Assessor (Entry-Level) — identify weaknesses, validate findings, support remediation
- Penetration Tester (Junior) — assist with scoped testing, recon, basic validation, and reporting
- Security Consultant (Entry-Level) — communicate findings and recommend fixes in plain language
Course Overview

CompTIA PenTest+ Certification Prep
Learn the penetration testing workflow—scoping, reconnaissance, vulnerability scanning, validation, and professional reporting—aligned to PenTest+ so you’re ready for the exam and entry-level security assessment work.
Module 1 — Introduction to Penetration Testing (4 hrs)
Pen test methodology (PTES, NIST), rules of engagement, legal considerations, and the phases of an assessment.
Module 2 — Setting Up a Penetration Testing Lab (4 hrs)
Build a safe lab with VMs and vulnerable targets; configure tools like Burp Suite, Nmap, Wireshark, and Kali Linux.
Module 3 — Planning & Scoping (4 hrs)
Define scope, identify targets, document objectives, validate requirements, and establish engagement boundaries.
Module 4 — Information Gathering (4 hrs)
Active and passive recon: WHOIS, DNS enumeration, OSINT tools, Shodan, service discovery, and fingerprinting.
Module 5 — Vulnerability Scanning (4 hrs)
Use tools like Nessus/OpenVAS, analyze results, validate findings, avoid false positives, and prepare for exploitation.
Module 6 — Exploitation Methods & Tools (4 hrs)
Exploit vulnerabilities using Metasploit, scripts, and custom payloads. Perform post‑exploitation and privilege escalation.
Module 7 — Network Attacks & Attack Vectors (4 hrs)
ARP spoofing, MITM, DNS poisoning, DoS/DDoS, SNMP enumeration, and targeting weak network services.
Module 8 — Wireless & Specialized System Attacks (4 hrs)
Wi‑Fi attacks (WEP/WPA cracking, Evil Twin), IoT/ICS vulnerabilities, mobile and embedded system exploitation.
Module 9 — Application-Based Attacks (4 hrs)
Test for SQLi, XSS, CSRF, command injection, insecure APIs, and web app misconfigurations using OWASP tools.
Module 10 — Host & Cloud Attack Vectors (4 hrs)
Local privilege escalation, password attacks, malware deployment, and cloud misconfiguration exploitation.
Module 11 — Social Engineering & Physical Attacks (4 hrs)
Phishing, pretexting, USB drops, badge cloning, and bypass techniques—plus ethical and reporting considerations.
Module 12 — Reporting & Communication (4 hrs)
Write professional pen test reports: risk rating, mitigation guidance, executive summaries, and evidence documentation.
Module 13 — Writing & Understanding Code (4 hrs)
Use Python, Bash, and PowerShell to automate attacks, parse data, modify scripts, and understand exploit code.
Module 14 — Final Penetration Testing Project (Part 1) (4 hrs)
Plan the engagement, perform recon, identify vulnerabilities, and launch initial exploitation in a full‑scope project.
Module 15 — Final Penetration Testing Project (Part 2) (4 hrs)
Execute deeper exploitation, escalate privileges, extract data, and deliver a complete pen test report & client debrief.
IT Professionals Moving Into Offensive Security
Ideal if you already understand basic networking/security and want hands‑on penetration testing skills.
Career Changers Targeting Ethical Hacking Roles
Built for those transitioning into cybersecurity and pursuing real‑world exploitation and assessment experience.
You Want a Recognized Offensive Security Credential
PenTest+ validates practical exploitation, reporting, and assessment abilities used by penetration testers.
PROGRAM BREAKDOWN
What’s Included in This Program
A complete, structured pathway to learn penetration testing fundamentals—aligned to CompTIA PenTest+.
Training is live, instructor-led online, with recorded sessions available for review. You’ll learn the step-by-step penetration testing process—so you understand what to do, in what order, and why it matters.
You’ll build skills in scoping and rules of engagement, reconnaissance and information gathering, vulnerability scanning and validation, plus attack vector concepts across networks, wireless, and applications—then learn how to document findings and communicate risk clearly.
You’ll also get access to practice and learning resources, plus an exam voucher + one retake (where applicable). Support is built in—including mentoring by appointment and onboarding before Day 1—so you’re set up to stay consistent and finish strong.
Skills You’ll Build
- Penetration testing workflow (from planning to reporting)
- Scoping & rules of engagement (safe, controlled testing)
- Reconnaissance basics (discovering assets and exposure)
- Vulnerability scanning (running scans and interpreting results)
- Validation concepts (confirming real risk vs noise)
- Network & wireless attack concepts (common vectors and risks)
- Web/app attack concepts (how app weaknesses are tested)
- Reporting & communication (clear findings + remediation guidance)
LIVE, INSTRUCTOR‑LED TRAINING • BUILT‑IN SUPPORT • INDUSTRY‑ALIGNED
Training Format
Classes are delivered live, instructor‑led online with real‑time lectures, demonstrations, guided practice, and interactive participation. All live sessions are recorded for 24/7 access, and a mandatory onboarding session ensures you’re fully set up before Day 1.
Student Support
IT students get practice labs, quizzes, exams, and vouchers (where applicable), plus individual mentoring by appointment, after‑hours support, and career coaching for résumé support, interview prep, and job search strategies.
Why Access Computer Training
FOLLOW OUR PATH TO SUCCESS
1
Book a Free Strategy Call
Confirm fit, timeline, and the best path for your goals—no pressure.
2
Review Funding & Payment Options
We’ll walk through your options and outline next steps so you can move forward confidently.
3
Get Your Personalized Roadmap
Leave with a clear action plan—what to take, when to start, and what to expect (including mandatory onboarding).
4
Start Training (Live Online)
Join a small cohort for instructor‑led classes, guided labs, and real exploitation practice. Every session is recorded for review.
5
Prepare & Pass PenTest+
Follow the structured plan mapped to PT0‑002—recon, scanning, exploitation, post‑exploitation, reporting.
Exam voucher + one retake included.
6
Career Prep Support
Resume polish, LinkedIn optimization, and interview coaching so you can apply with confidence.
7
Apply, Interview, Get Hired
Use your new offensive security skills, certification, and support resources to step into entry‑level pen testing and security roles faster.
Fit Check + FAQ
Is This Program a Good Fit?
If you want a structured path into ethical hacking and security assessment—without trial and error—this program gives you a clear plan for CompTIA PenTest+.
- You want practical skills in vulnerability assessment and validation.
- You want to learn the penetration testing workflow—scoping → recon → scanning → reporting.
- You prefer live, instructor-led online training instead of self-paced guessing.
- You want recorded sessions so you can review anytime and catch up fast.
- You want exam-aligned prep with an exam voucher + one retake (where applicable).
FAQ
This course prepares you for one certification: CompTIA PenTest+. It’s designed to build penetration testing fundamentals—planning, reconnaissance, vulnerability scanning, validation concepts, and professional reporting.
Training is live, instructor-led online (synchronous). You attend scheduled sessions in real time and get guided instruction instead of trying to piece everything together alone.
You’ll have access to structured learning resources and support throughout the program, including practice tools for IT students, plus mentoring by appointment and after-hours support when you need extra help.
Yes. Sessions are recorded and available for review, so you can rewatch difficult topics, reinforce what you learned, and catch up quickly if you miss a class.
Before Day 1, you’ll complete a mandatory onboarding session to make sure your setup and access are ready. You’ll need a Windows PC, reliable internet, and ideally dual monitors (or a second device) for smoother participation during live training.
NOT SURE WHICH TRAINING PATH IS RIGHT FOR YOU?
Book a Free 30-Minute Career Strategy Call
In a free 30-minute call, we’ll learn about your goals, experience, and career direction—then help you choose the program, certifications, and next steps that make the most sense for you.
- Get clarity on which program fits your goals
- Understand certifications, schedule, and funding options
- Leave with a clear next step and no pressure to commit