UP TO 50% OFF on Combo Courses!

CompTIA PenTest+ (PT0-002) Certification Training Online
Read Reviews

A successful candidate for CompTIA PenTest+ certification will demonstrate their ability to perform a penetration test, including vulnerability scanning, understanding legal and compliance requirements, analyzing the results, and producing a written report.

CompTIA PenTest+ Course Highlights

  • 40hrs of instructor-led training
  • Blended learning delivery model
  • Certified & Experienced Trainers
  • CompTIA Authorized Training Partner
  • Get certified at an affordable price

Accredited By

InfosecTrain Learning Bonanza Offer Buy 1 Get 4*

Register for any Course and get 4 eLearning (Worth USD 199 Self-paced Learning) Courses 100% free. Don't miss this offer Enroll Now

  • Cyber Security Engineer Masterclass
  • Cyber Security Fundamentals (JCP)
  • Introduction of Data Privacy
  • Red Team Ethical Hacking Masterclass

*All 4 free courses are eLearning modules, providing self-paced learning through instructional videos. Offer valid till July 31st, 2024.

Choose your Preferred Learning Mode



Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

Get Started


Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred


Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business
customized training

Looking for a customized training?


CompTIA PenTest+ Course Description


CompTIA PenTest+ is one of the most comprehensive courses that cover all the PenTesting stages. PenTest+ is the only exam that incorporates all aspects of vulnerability management. This course also includes all the latest techniques used against the expanded attack surfaces. 

InfosecTrain has designed a CompTIA PenTest+ PT0-002 course where you will learn to plan and scope a penetration testing engagement, perform pen-testing using correct techniques, tools, and then analyze the outcomes, you will also learn how to understand the compliance and legal requirements, you will also be able to produce a written report containing proposed remediation techniques. 

From the CompTIA PT0-002 course designed by InfosecTrain, you will also learn about Regulatory compliance considerations, location restrictions, rules of engagement, background checks of penetration testing teams, DNS lookups, open-source intelligence, enumeration, fingerprinting, scanning methods, attack methods, injection attacks, report audience, data structures and many more. 

Target Audience

  • IT Security Analyst
  • Penetration and Vulnerability tester
  • Network Security operational
  • Application security vulnerability analyst


  • Minimum 3 to 4 years of experience in the field of IT security or related field.
  • Network and security knowledge.

Exam Information

Exam Code PT0-002
Launch date Oct 27, 2021
Number of Questions Maximum of 85 questions
Type of Questions Performance-based and multiple choice
Length of Test 165 minutes
Passing Score 750 (on a scale of 100-900)
Languages English and Japanese


7 + 47 =

CompTIA PenTest+ Course Objectives

  • Knowledge on performing penetration testing and vulnerability scanning.
  • Analysing the results and data and communicate results through effective reporting.
  • Analyse the importance of planning and key aspects of compliance
  • Learn to explore the network, wireless and RF vulnerabilities and physical security attacks and perform post-exploitation techniques.
  • Understand penetration testing through various coding scripts such as Python, Ruby, Bash and PowerShell to gather information from the tool.
  • Understand the pliability of the network to vulnerable attacks and how to mitigate them.
  • Knowledge on overall state of improving the IT security across an organisation

CompTIA PenTest+ Course Content

1.0 planning and scoping

  • 1.1 Compare and contrast governance, risk, ad compliance concepts
  • 1.2 Explain the importance of scoping organizations/customer requirements
  • 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.

2.0 Information gathering and vulnerability scanning

  • 2.1 Given a scenario, perform passive reconnaissance
  • 2.2 Given a scenario, perform active reconnaissance
  • 2.3 Given a scenario, analyze the results of a reconnaissance exercise
  • 2.4 Given a scenario, perform vulnerability scanning

3.0 Attacks and Exploits

  • 3.1 Given a scenario, research attack vectors and perform network attacks
  • 3.2 Given a scenario, research attack vectors and perform wireless attacks
  • 3.3 Given a scenario, research attack vectors and perform application-based attacks
  • 3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies
  • 3.5 Explain common attacks and vulnerabilities against specialized systems
  • 3.6 Given a scenario, perform a social engineering or physical attack
  • 3.7 Given a scenario, perform post-exploitation techniques

4.0 Reporting and Communication

  • 4.1 Compare and contrast important components of written reports
  • 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
  • 4.3 Explain the importance of communication during the penetration testing process
  • 4.4 Explain post-report delivery activities

5.0 Tools and Code Analysis

  • 5.1 Explain the basic concepts of scripting and software development
  • 5.2 Given a scenario, analyze a script or code sample for use in a penetration test
  • 5.3 Explain use cases of the following tools during the phases of a penetration test

Need customized curriculum? Talk to Advisor

Here's What people are saying about InfosecTrain

Benefits You Will Access Why Infosec Train

Student-infosectrain Certified & Experienced Instructors
24x71-infosectrain Post Training Support
tailor-infosectrain Customized Training
flexible-infosectrain Flexible Schedule
video1-infosectrain Access to Recorded Sessions

Latest Blog Posts

Scenario-Based Interview Prep Series on Network Security