Useful Links
Contact Us
- 1537 Dale Mabry Hwy, #101 Lutz, FL 33548
- 813-575-8400
- [email protected]
The CompTIA PenTest+ Certification is a globally recognized credential that validates your skills in penetration testing, vulnerability assessment, and network security. It proves your ability to identify and manage security vulnerabilities, essential for cybersecurity professionals.
This course provides hands-on training in testing network security, performing vulnerability assessments, and creating secure environments. You’ll be fully prepared to pass the CompTIA PenTest+ exam and apply these skills to protect sensitive data.
Ideal for network security administrators, ethical hackers, and security consultants, this course helps you enhance your expertise and advance your career in the growing field of cybersecurity.
Module 1: Introduction to Penetration Testing
“Introduction to Penetration Testing” covers the definition, objectives, and legal considerations of penetration testing, explores different types of testing (internal vs. external, white-box, black-box, and gray-box), and discusses methodologies including OWASP, NIST, PTES, and ISSAF frameworks.
Class Length: 5 hrs.
Module 2: Planning and Scoping
“Planning and Scoping” involves defining the scope, rules of engagement, and target environment for penetration testing, addressing legal and compliance requirements (such as GDPR, HIPAA, and PCI-DSS), managing resources and timeframes, and conducting risk analysis and mitigation.
Class Length: 5 hrs.
Module 3: Information Gathering and Vulnerability Identification
“Information Gathering and Vulnerability Identification” covers passive reconnaissance techniques (such as WHOIS, DNS, and social media), active reconnaissance methods (including scanning and probing with tools like Nmap and Nessus), using vulnerability scanning tools (such as Nessus, OpenVAS, and Nikto), and analyzing and prioritizing vulnerabilities using CVSS scoring and risk assessment.
Class Length: 5 hrs.
Module 4: Attacks and Exploits
“Attacks and Exploits” covers network attacks (such as MITM, DoS, and spoofing), common web application vulnerabilities (like SQL injection, XSS, and CSRF), exploitation frameworks (including Metasploit and Cobalt Strike), privilege escalation techniques, and post-exploitation strategies (such as maintaining access, covering tracks, and pivoting).
Class Length: 5 hrs.
Module 5: Wireless and Mobile Attacks
“Wireless and Mobile Attacks” includes penetration testing of wireless networks (attacks on Wi-Fi such as WEP/WPA cracking and rogue APs), mobile device security (vulnerabilities in mobile OS and apps), and attacks on Bluetooth and NFC communication protocols.
Class Length: 5 hrs.
Module 6: Reporting and Communication
“Reporting and Communication” covers writing a penetration testing report (including structure, content, and delivery), effectively communicating findings to both technical and non-technical stakeholders, providing actionable remediation recommendations, and conducting follow-up testing to verify remediation efforts and re-tests.
Class Length: 5 hrs.
Module 7: Tools and Techniques
“Tools and Techniques” provides an overview and hands-on experience with key penetration testing tools (such as Metasploit and Burp Suite), covers scripting and automation (using Python and Bash for task automation), and includes techniques for simulating Advanced Persistent Threats (APTs) in a controlled environment.
Class Length: 5 hrs.
Module 8: Professionalism and Ethics
“Professionalism and Ethics” covers the ethical principles of penetration testing, legal implications and how to avoid legal pitfalls, and best practices for maintaining professionalism in the field.
Class Length: 5 hrs.