CompTIA PenTest+ (Ethical Hacking)

4.9 (18 REVIEWS)
16 STUDENTS

GET THIS COURSE AND 1500+ OTHERS FOR ONLY £49 FIND OUT MORE

CompTIA PenTest+ (Ethical Hacking) Course teaches you everything on the topic thoroughly from scratch so you can achieve a professional certificate for free to showcase your achievement in professional life. This CompTIA PenTest+ (Ethical Hacking) Course is a comprehensive, instructor-guided course, designed to provide a detailed understanding of the nature of the related sector and your key roles within it.

To become successful in your profession, you must have a specific set of skills to succeed in today’s competitive world. In this in-depth training course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills.

The training materials of this course are available online for you to learn at your own pace and fast-track your career with ease.

Sneak Peek

Who should take the course

Anyone with a knack for learning new skills can take this CompTIA PenTest+ (Ethical Hacking) Course. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions.

Certification

Once you’ve successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). All of our courses are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

functional skills maths level 2

Accreditation

All of our courses, including this CompTIA PenTest+ (Ethical Hacking) Course, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field.

Course Curriculum

The detailed curriculum outline of our CompTIA PenTest+ (Ethical Hacking) Course is as follows:

Introduction

  • Introduction to the CompTIA PenTest+ (PT0-002) Course
  • About the CompTIA PenTest+ (PT0-002) Exam

Section 01: Planning and Engagement

  • Planning a Pen Test
  • Rules of Engagement
  • Regulatory Compliance
  • Resources and Budget
  • Impact and Constraints
  • Support Resources
  • Legal Groundwork
  • Service Provider Agreements
  • Standards and Methodologies, Part 1
  • Standards and Methodologies, Part 2
  • Environmental and Scoping Considerations
  • Ethical Mindset
  • Lab Environment Setup
  • Project Strategy and Risk
  • Scope Vulnerabilities
  • Compliance-Based Assessments

Section 02: Information Gathering and Vulnerability Scanning

  • Scanning and Enumeration
  • Scanning Demo
  • Packet Investigation
  • Packet Inspection Demo
  • Labtainers Setup
  • Labtainers Lab (Wireshark)
  • Application and Open-Source Resources
  • Passive Reconnaissance
  • Active Reconnaissance
  • Vulnerability Scanning
  • Vulnerability Scanning Demo
  • Labtainers Lab (Network Basics)
  • Labtainers Lab (Nmap Discovery)
  • Target Considerations
  • Analyzing Scan Output
  • Nmap Scoping and Output Options
  • Nmap Timing and Performance Options
  • Prioritization of Vulnerabilities
  • Common Attack Techniques
  • Automating Vulnerability Scans
  • Credential Attacks
  • Labtainers Lab (Password Cracking)
  • Labtainers Lab (Secure Socket Layers)
  • Labtainers Lab (Routing Basics)

Section 03: Network-Based Attacks

  • Exploit Resources and Network Attacks
  • Network-Based Exploits
  • FTP Exploit Demo
  • Man-in-the-middle Exploits
  • Labtainers Lab (TCP/IP Attacks)
  • Labtainers Lab (ARP Spoof Attacks)
  • Labtainers Lab (Local DNS Attacks)
  • Labtainers Lab (MACs and Hash Functions)

Section 04: Selecting Pen Testing Tools

  • Wireless Exploits
  • Wireless Exploits, Part 2
  • Antennas

Section 05: Reporting and Communication

  • OWASP Top 10
  • Application Exploits, Part 1
  • SQL Injection Demo
  • Labtainers Lab (SQL Injection)
  • Application Exploits, Part 2
  • Application Exploits, Part 3
  • Cross-Site Scripting Demo
  • Labtainers Lab (Cross-Site Scripting)
  • Labtainers Lab (Cross-Site Request Forgery)
  • Code Vulnerabilities
  • API Attacks and Attack Resources
  • Privilege Escalation (Linux)
  • Privilege Escalation (Windows)
  • Misc. Privilege Escalation
  • Misc. Local Host Vulnerabilities

Section 06: Attacking the Cloud

  • Cloud Attacks, Part 1
  • Cloud Attacks, Part 2

Section 07: Specialized and Fragile Systems

  • Mobile Attacks
  • IoT Attacks
  • Data Storage and Management Interface Attacks
  • Virtual and Containerized Environment Attacks
  • Labtainers Lab (Industrial Control System)

Section 08: Social Engineering and Physical Attacks

  • Pretext for a Social Engineering Attack
  • Remote Social Engineering
  • Spear Phishing Demo
  • In-Person Social Engineering
  • Physical Security

Section 09: Post-Exploitation

  • Post-Exploitation Techniques
  • Post-Exploitation Tools
  • Network Segmentation Testing
  • Persistence and Stealth
  • Detection Avoidance Techniques

Section 10: Post-Engagement Activities

  • Report Writing
  • Important Components of Written Reports
  • Mitigation Strategies
  • Technical and Physical Controls
  • Administrative and Operational Controls
  • Communication
  • Presentation of Findings
  • Post-Report Activities
  • Data Destruction Process

Section 11: Tools and Programming

  • Using Scripting in Pen Testing
  • Bash Scripting Basics
  • Bash Scripting Techniques
  • PowerShell Scripts
  • Ruby Scripts
  • Python Scripts
  • Scripting Languages Comparison
  • Data Structures, Part 1
  • Data Structures, Part 2
  • Libraries
  • Classes
  • Procedures and Functions
  • Perl and JavaScript

Section 12: Tools Inventory

  • Pen Testing Toolbox
  • Using Kali Linux
  • Scanners & Credential Tools
  • Code-Cracking Tools
  • Open-Source Research Tools
  • Wireless and Web Pen Testing Tools
  • Remote Access Tools
  • Analyzers and Mobile Pen Testing Tools
  • Other Pen Testing Tools
  • Labtainers Lab (Metasploit Framework)
  • Labtainers Lab (Wireshark Packet Inspection)
  • Labtainers Lab (SSH)
  • Scanners, Debuggers, and Wireless Tools
  • Web, Steganography, and Cloud Tools
CompTIA PenTest+ (Ethical Hacking)
ex Vat

SAVE 84% - OFFER ENDS SOON

TAKE THIS COURSE
  • Original price was: £125.00.Current price is: £20.00. ex Vat
  • 1 year
  • Course Certificate
  • 14 hours, 42 minutes
  • Gift this course

Subscribe to this course and 2,000+ top‑rated Training Express courses for your organization.

Try Training Express Business
  • For teams of 5 or more users
  • 2,000+ fresh & in-demand courses
  • Learning Engagement tools
  • SSO and LMS Integrations
16 STUDENTS ENROLLED

 

0
    0
    Your Cart

    Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49 per year

    ADD OFFER TO CART

    No more than 50 active courses at any one time. Membership renews after 12 months. Cancel anytime from your account. Certain courses are not included. Can't be used in conjunction with any other offer.

      Apply Coupon
        ×

        Hello!

        Click one of our contacts below to chat on WhatsApp

        × How can we assist you today?