CompTIA PenTest +

Description

Duration: 5 days

This five-day course is intended to prepare students for a career in protecting organizations and their customer’s from breaches in privacy and security.

Penetration testing is becoming a valuable asset in CyberSecurity as organizations continue their efforts to prevent privacy and security breaches before they occur. This course will give students an introduction to the general and methodologies in relation to Pen Testing.

Upon completion of this course, students will have:

  • Knowledge and skills required to plan and scope an assessment
  • Understand legal and compliance requirements
  • Perform vulnerability scanning and penetration testing
  • Analyze data
  • Effectively report and communicate skills

Possible career paths after completing this course:

  • Penetration tester
  • Vulnerability tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability

Prerequisites

Before taking this course, it is recommended that students:

Have equivalent knowledge of or certification in Network+ or Security+
3-4 years of hands-on information security or related experience

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/25/202312/29/2023
1/15/20241/19/2024
2/5/20242/9/2024
2/26/20243/1/2024
3/18/20243/22/2024
4/8/20244/12/2024
4/29/20245/3/2024
5/20/20245/24/2024
6/10/20246/14/2024
7/1/20247/5/2024
7/22/20247/26/2024
8/12/20248/16/2024
9/2/20249/6/2024
9/23/20249/27/2024
10/14/202410/18/2024
11/4/202411/8/2024
11/25/202411/29/2024
12/16/202412/20/2024
1/6/20251/10/2025

Curriculum

Module 1: Planning and Scoping Penetration Tests

Introduction to Penetration Testing Concepts
Plan a Pen Test Engagement
Scope and negotiate a Pen Test Engagement
Prepare for a Pen Test Engagement

Module 2: Conducting Passive Reconnaissance

Gather Background Information
Prepare Background findings for Next Steps

Module 3: Performing Non-Technical Tests

Perform Social Engineering Tests
Perform Physical Security Tests on Facilities

Module 4: Conducting Active Reconnaissance

Scan Networks
Enumerate Targets
Scan for vulnerabilities
Analyze Basic Scripts

Module 5: Analyzing Vulnerabilities

Analyze Vulnerability Scan Results
Leverage Information to prepare for exploitation

Module 6: Penetrating Networks

Exploit Network-Based Vulnerabilities
Exploit Wireless and RF-Based Vulnerabilities
Exploit Specialized Systems

Module 7: Exploiting Host-Based Vulnerabilities

Exploit Windows-Based Vulnerabilities
Exploit Nix-Based Vulnerabilities

Module 8: Testing Applications

Exploit Web Application Vulnerabilities
Test Source Code and Complied Apps

Module 9: Completing Post-Exploit Tasks

Use Lateral Movement Techniques
Use Persistence Techniques
Use Anti-Forensics Techniques

Module 10: Analyzing and Reporting Pen Test Results

Analyze Pen Test Data
Develop Recommendations for Mitigation Strategies
Write and Handle Reports
Conduct Post-Report-Delivery Activities