CompTIA PenTest+ (Pentest)
Virtual Instructor Led Course delivered online
Churchill Square Training and Development
Summary
- Tutor is available to students
Add to basket or enquire
Overview
Security remains a focal point in both IT and various industries, with frequent reports of privacy and security breaches making headlines. As organizations strive to safeguard themselves and their clientele, proficiency in penetration testing has become an increasingly valuable skill set. This course delves into fundamental concepts and methodologies related to penetration testing, offering practical experience through a simulated pen test for a fictional company.
Objectives:
Upon completion of this course, participants will gain the ability to plan, execute, analyze, and report on penetration tests. The key competencies include:
Planning and Scoping:
- Formulating strategies for penetration tests.
- Defining the scope of assessments.
Passive Reconnaissance:
- Employing non-intrusive methods to gather information.
Non-Technical Tests:
- Executing non-technical assessments for data collection.
Active Reconnaissance:
- Engaging in active methods to gather intelligence.
Vulnerability Analysis:
- Assessing and analyzing vulnerabilities in systems.
Network Penetration:
- Infiltrating and testing the security of networks.
Exploiting Host-Based Vulnerabilities:
- Identifying and exploiting vulnerabilities at the host level.
Application Testing:
- Evaluating and testing the security of applications.
Post-Exploit Tasks:
- Completing tasks following successful exploitation.
Analysis and Reporting:
- Evaluating and documenting the results of penetration tests.
This course provides a comprehensive foundation, equipping participants with the skills needed to contribute effectively to organizational security efforts and potentially unlocking lucrative opportunities in the field.
Resources
- CompTIA PenTest+ (PenTest) - download
Description
Course Outline:
1 – Outline
- Lesson 1: Scoping Organization/Customer Requirements
- Lesson 2: Defining the Rules of Engagement
- Lesson 3: Footprinting and Gathering Intelligence
- Lesson 4: Evaluating Human and Physical Vulnerabilities
- Lesson 5: Preparing the Vulnerability Scan
- Lesson 6: Scanning Logical Vulnerabilities
- Lesson 7: Analyzing Scanning Results
- Lesson 8: Avoiding Detection and Covering Tracks
- Lesson 9: Exploiting the LAN and Cloud
- Lesson 10: Testing Wireless Networks
- Lesson 11: Targeting Mobile Devices
- Lesson 12: Attacking Specialized Systems
- Lesson 13: Web Application-Based Attacks
- Lesson 14: Performing System Hacking
- Lesson 15: Scripting and Software Development
- Lesson 16: Leveraging the Attack: Pivot and Penetrate
- Lesson 17: Communicating During the PenTesting Process
- Lesson 18: Summarizing Report Components
- Lesson 19: Recommending Remediation
- Lesson 20: Performing Post-Report Delivery Activities
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.