
PenTest+ Training
Course Duration
5 Days
Audience
Employees of federal, state and local governments; and businesses working with the government.
Prerequisites
To ensure your success in this course, you should have intermediate knowledge of information security concepts including identity and access management, cryptography, networking, and common security technologies. Practical experience securing various computing environments, including small-to-medium business and enterprise settings, is also recommended.
Course Description
The CompTIA PenTest+ course prepares students to plan and carry out penetration testing engagements from start to finish. Students learn to scope and negotiate engagements, perform reconnaissance, scan and enumerate targets, exploit vulnerabilities across network, wireless, application, and operating system layers, and use post-exploitation techniques including lateral movement and persistence. The course also covers how to analyze findings, develop remediation recommendations, and produce professional pentest reports. PenTest+ maps to DoD 8570 requirements and is recognized across government and industry as a vendor-neutral penetration testing credential.
Course Outline
- Introduction to Penetration Testing Concepts
- Plan a Pen Test Engagement
- Scope and Negotiate a Pen Test Engagement
- Prepare for a Pen Test Engagement
- Gather Background Information
- Prepare Background Findings for Next Steps
- Perform Social Engineering Tests
- Perform Physical Security Tests on Facilities
- Scan Networks
- Enumerate Targets
- Scan for Vulnerabilities
- Analyze Basic Scripts
- Analyze Vulnerability Scan Results
- Leverage Information to Prepare for Exploitation
- Exploit Network-Based Vulnerabilities
- Exploit Wireless and RF-Based Vulnerabilities
- Exploit Specialized Systems
- Exploit Windows-Based Vulnerabilities
- Exploit *nix-Based Vulnerabilities
- Exploit Web Application Vulnerabilities
- Test Source Code and Compiled Apps
- Use Lateral Movement Techniques
- Use Persistence Techniques
- Use Anti-Forensics Techniques
- Analyze Pen Test Data
- Develop Recommendations for Mitigation Strategies
- Write and Handle Reports
- Conduct Post-Report-Delivery Activities