PenTest+
5-Day Course
Course Overview
This course provides the knowledge needed to plan and perform penetration tests and other security engagements, using a vendor-neutral format. This includes planning engagements, performing reconnaissance to find vulnerabilities in a target organization, exploiting vulnerable targets, and creating followup reports. This course maps to the CompTIA PenTest+ certification exam (PT0-001). Objective coverage is marked throughout the course.

Why Choose 327 Solutions for CompTIA Training?
327 Solutions has been delivering CompTIA training for decades
327 Solutions deploys our trainers to world class education center and institutions of higher education
327 Solutions guarantees that you will pass your exam, or you can resit any class at no-charge
327 Solutions utilizes a blended learning model with pre-class level setting, intensive in-class training with labs, and post-training support
Every class attendee will receive 40 PDU/CEUs and a Certificate of Completion

Course Outline
Course Objectives
- CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
- Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings.
- Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security.
Course Content
Chapter 1: Engagement planning
- Module A: Assessment types and goals
- Module B: The penetration testing process
- Module C: Documentation and planning
- Module D: Engagement scope
- Module E: Scripting
Chapter 2: Reconnaissance
- Module A: Reconnaissance techniques
- Module B: OSINT gathering
Chapter 3: Active Reconnaissance
- Module A: Network scanning
- Module B: Vulnerability scanning
- Module C: Application testing
Chapter 4: Leveraging target information
- Module A: Vulnerability analysis
- Module B: Exploitation techniques
Chapter 5: Exploiting organizational vulnerabilities
- Module A: Social engineering
- Module B: Physical security attacks
Chapter 6: Exploiting network vulnerabilities
- Module A: Network attacks
- Module B: Wireless attacks
Chapter 7: Exploiting applications
- Module A: Attacking insecure code
- Module B: Attacking web applications
Chapter 8: Host exploitation
- Module A: Finding host vulnerabilities
- Module B: Operating system exploits
- Module C: Post-exploitation techniques
Chapter 9: Engagement followup
- Module A: Report preparation
- Module B: Remediation and followup
Prerequisites
CompTIA Network+, Security+ or equivalent knowledge with a minimum of 3-4 year of hands-on information security experience.
Who Should Attend
Those seeking to pass the PenTest+ exam