Spend Less & Save More with our Exciting End-of-Year offers (BUY 1 GET 1 FREE) | Offer ending in:
D H M S Grab Now
X

CompTIA PenTest+ (PT0-002) Certification Training Online
Read Reviews

A successful candidate for CompTIA PenTest+ certification will demonstrate their ability to perform a penetration test, including vulnerability scanning, understanding legal and compliance requirements, analyzing the results, and producing a written report.

CompTIA PenTest+ Course Highlights

  • 40hrs of instructor-led training
  • Blended learning delivery model
  • Certified & Experienced Trainers
  • CompTIA Authorized Training Partner
  • Get certified at an affordable price

Accredited By

Choose your Preferred Learning Mode

1-TO-1 TRAINING

Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

Get Started

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

Looking for a customized training?

REQUEST A BATCH

CompTIA PenTest+ Course Description

Overview

CompTIA PenTest+ is one of the most comprehensive courses that cover all the PenTesting stages. PenTest+ is the only exam that incorporates all aspects of vulnerability management. This course also includes all the latest techniques used against the expanded attack surfaces. 

InfosecTrain has designed a CompTIA PenTest+ PT0-002 course where you will learn to plan and scope a penetration testing engagement, perform pen-testing using correct techniques, tools, and then analyze the outcomes, you will also learn how to understand the compliance and legal requirements, you will also be able to produce a written report containing proposed remediation techniques. 

From the CompTIA PT0-002 course designed by InfosecTrain, you will also learn about Regulatory compliance considerations, location restrictions, rules of engagement, background checks of penetration testing teams, DNS lookups, open-source intelligence, enumeration, fingerprinting, scanning methods, attack methods, injection attacks, report audience, data structures and many more. 

Target Audience

  • IT Security Analyst
  • Penetration and Vulnerability tester
  • Network Security operational
  • Application security vulnerability analyst

Pre-requisites

  • Minimum 3 to 4 years of experience in the field of IT security or related field.
  • Network and security knowledge.

Exam Information

Exam Code PT0-002
Launch date Oct 27, 2021
Number of Questions Maximum of 85 questions
Type of Questions Performance-based and multiple choice
Length of Test 165 minutes
Passing Score 750 (on a scale of 100-900)
Languages English and Japanese

GET A FREE DEMO CLASS

For
Captcha*
4 + 16 =
loader-infosectrain

CompTIA PenTest+ Course Objectives

  • Knowledge on performing penetration testing and vulnerability scanning.
  • Analysing the results and data and communicate results through effective reporting.
  • Analyse the importance of planning and key aspects of compliance
  • Learn to explore the network, wireless and RF vulnerabilities and physical security attacks and perform post-exploitation techniques.
  • Understand penetration testing through various coding scripts such as Python, Ruby, Bash and PowerShell to gather information from the tool.
  • Understand the pliability of the network to vulnerable attacks and how to mitigate them.
  • Knowledge on overall state of improving the IT security across an organisation

CompTIA PenTest+ Course Content

1.0 planning and scoping

  • 1.1 Compare and contrast governance, risk, ad compliance concepts
  • 1.2 Explain the importance of scoping organizations/customer requirements
  • 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.

2.0 Information gathering and vulnerability scanning

  • 2.1 Given a scenario, perform passive reconnaissance
  • 2.2 Given a scenario, perform active reconnaissance
  • 2.3 Given a scenario, analyze the results of a reconnaissance exercise
  • 2.4 Given a scenario, perform vulnerability scanning

3.0 Attacks and Exploits

  • 3.1 Given a scenario, research attack vectors and perform network attacks
  • 3.2 Given a scenario, research attack vectors and perform wireless attacks
  • 3.3 Given a scenario, research attack vectors and perform application-based attacks
  • 3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies
  • 3.5 Explain common attacks and vulnerabilities against specialized systems
  • 3.6 Given a scenario, perform a social engineering or physical attack
  • 3.7 Given a scenario, perform post-exploitation techniques

4.0 Reporting and Communication

  • 4.1 Compare and contrast important components of written reports
  • 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
  • 4.3 Explain the importance of communication during the penetration testing process
  • 4.4 Explain post-report delivery activities

5.0 Tools and Code Analysis

  • 5.1 Explain the basic concepts of scripting and software development
  • 5.2 Given a scenario, analyze a script or code sample for use in a penetration test
  • 5.3 Explain use cases of the following tools during the phases of a penetration test

Need customized curriculum? Talk to Advisor

Here is What people are saying about InfosecTrain

Benefits You Will Access Why Infosec Train

Student-infosectrain Certified & Experienced Instructors
24x71-infosectrain Post Training Support
tailor-infosectrain Tailor Made Training
flexible-infosectrain Flexible Schedule
video1-infosectrain Access to the Recorded Sessions

Latest Blog Posts

TOP