CompTIA PenTest+ Certification Training Online

A successful candidate for CompTIA PenTest+ certification will demonstrate their ability to perform a penetration test, including vulnerability scanning, understanding legal and compliance requirements, analyzing the results, and producing a written report.

Course Highlights

  • 32hrs of instructor-led training
  • Certified & Experienced Trainers
  • Get certified at an affordable price
  • Blended learning delivery model
  • CompTIA Authorized Training Partner

CompTIA PenTest+

CompTIA PenTest+ is one of the most comprehensive courses that cover all the PenTesting stages. PenTest+ is the only exam that incorporates all aspects of vulnerability management. This course also includes all the latest techniques used against the expanded attack surfaces.

InfosecTrain has designed a CompTIA PenTest+ PT0-002 course where you will learn to plan and scope a penetration testing engagement, perform pen-testing using correct techniques, tools, and then analyze the outcomes, you will also learn how to understand the compliance and legal requirements, you will also be able to produce a written report containing proposed remediation techniques.

From the CompTIA PT0-002 course designed by InfosecTrain, you will also learn about Regulatory compliance considerations, location restrictions, rules of engagement, background checks of penetration testing teams, DNS lookups, open-source intelligence, enumeration, fingerprinting, scanning methods, attack methods, injection attacks, report audience, data structures and many more.

1.0 planning and scoping

  • 1.1 Compare and contrast governance, risk, ad compliance concepts
  • 1.2 Explain the importance of scoping organizations/customer requirements
  • 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.

2.0 Information gathering and vulnerability scanning

  • 2.1 Given a scenario, perform passive reconnaissance
  • 2.2 Given a scenario, perform active reconnaissance
  • 2.3 Given a scenario, analyze the results of a reconnaissance exercise
  • 2.4 Given a scenario, perform vulnerability scanning

3.0 Attacks and Exploits

  • 3.1 Given a scenario, research attack vectors and perform network attacks
  • 3.2 Given a scenario, research attack vectors and perform wireless attacks
  • 3.3 Given a scenario, research attack vectors and perform application-based attacks
  • 3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies
  • 3.5 Explain common attacks and vulnerabilities against specialized systems
  • 3.6 Given a scenario, perform a social engineering or physical attack
  • 3.7 Given a scenario, perform post-exploitation techniques

4.0 Reporting and Communication

  • 4.1 Compare and contrast important components of written reports
  • 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
  • 4.3 Explain the importance of communication during the penetration testing process
  • 4.4 Explain post-report delivery activities

5.0 Tools and Code Analysis

  • 5.1 Explain the basic concepts of scripting and software development
  • 5.2 Given a scenario, analyze a script or code sample for use in a penetration test
  • 5.3 Explain use cases of the following tools during the phases of a penetration test
  • IT Security Analyst
  • Penetration and Vulnerability tester
  • Network Security operational
  • Application security vulnerability analyst

  • Minimum 3 to 4 years of experience in the field of IT security or related field.
  • Network and security knowledge.

  • Knowledge on performing penetration testing and vulnerability scanning.
  • Analysing the results and data and communicate results through effective reporting.
  • Analyse the importance of planning and key aspects of compliance
  • Learn to explore the network, wireless and RF vulnerabilities and physical security attacks and perform post-exploitation techniques.
  • Understand penetration testing through various coding scripts such as Python, Ruby, Bash and PowerShell to gather information from the tool.
  • Understand the pliability of the network to vulnerable attacks and how to mitigate them.
  • Knowledge on overall state of improving the IT security across an organisation
Exam Code PT0-002
Launch date Oct 27, 2021
Number of Questions Maximum of 85 questions
Type of Questions Performance-based and multiple choice
Length of Test 165 minutes
Passing Score 750 (on a scale of 100-900)
Languages English and Japanese

Still Confused About Course?
Talk to Our Experts!