Nous serions heureux de vous conseiller !
1­-855­-778­-7246    Contact

CompTIA Penetration Testing (PENTEST+)

 

Résumé du cours

In this course, you'll get the skills you need to identify, exploit, report, and manage vulnerabilities on a network.

This course builds upon skills learnt from CompTIA Security+ certification and provides you with the intermediate skills and best practice for penetration testing.

Your expert instructor will teach you up-to-date penetration testing skills, helping you develop vulnerability assessment techniques and the management skills necessary to determine how resilient a network is to attacks.

Contenu

Planning and Scoping
  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
Information Gathering and Vulnerability Identification
  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
Attacks and Exploits
  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques
Penetration Testing Tools
  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
Reporting and Communication
  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

A qui s'adresse cette formation

If you're an intermediate level cyber security professional tasked with penetration testing, this course is ideal for you.

Pré-requis

Before attending this course, you should have:

  • Network+, Security+ or equivalent knowledge
  • A minimum of 2-3 years of hands-on information security or related experience

Objectifs

You'll learn to:

  • customise assessment frameworks
  • report penetration test findings
  • communicate recommended strategies

On this course, you'll prepare for the CompTIA PenTest+ exam The performance-based PenTest+ exam involves hands-on simulations, proving you've moved beyond theory and have the practical skills to carry out penetration testing techniques.

Achieving this certification qualifies you for a role as a:

  • Penetration Tester
  • Vulnerability Tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability

Outline: CompTIA Penetration Testing (PENTEST+)

Planning and Scoping
  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
Information Gathering and Vulnerability Identification
  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
Attacks and Exploits
  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques
Penetration Testing Tools
  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
Reporting and Communication
  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process
Formation en ligne

Durée 5 jours

Prix
  • CAD 3 955,–
Formation en salle équipée

Durée 5 jours

Prix
  • Canada: CAD 3 955,–
 
Cliquez sur le nom de la ville ou sur "Formation en ligne" pour réserver Agenda
This is an Instructor-Led Classroom course
Instructor-led Online Training:   Cours en ligne avec instructeur
Formation en mode FLEX, à la fois à distance et en présentiel. Tous nos cours FLEX sont aussi des ILO (Instructor-Led Online).
Allemagne
Formation en mode FLEX. Berlin S'inscrire
Formation en ligne Fuseau horaire: Europe/Berlin S'inscrire
Formation en mode FLEX. Francfort S'inscrire
Formation en ligne Fuseau horaire: Europe/Berlin S'inscrire
Italie
Formation en ligne Fuseau horaire: Europe/Rome S'inscrire
Formation en mode FLEX. Sesto San Giovanni (MI) S'inscrire
Formation en ligne Fuseau horaire: Europe/Rome S'inscrire
Slovénie
Formation en ligne Fuseau horaire: Europe/Ljubljana Langue: Anglais S'inscrire