CompTIA Digital Solutions Catalog

COURSE OVERVIEW

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. The CompTIA PenTest+ certification exam will verify successful candidates have the knowledge and skills required to:

• Plan and scope a penetration testing engagement • Understand legal and compliance requirements

• Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results • Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations

Learners experience both knowledge acquisition and hands-on skills attainment through a single login and seamless workflow. Additionally, organizations who purchase the integrated course will be able to review student and group lab scores in the CertMaster Learn Boost Dashboard and hold students accountable for lab work. INTEGRATED LEARNING PRODUCTS CERTMASTER LEARN & CERTMASTER LABS

Student Guide Lesson Overview

4 3 2 1 Scoping Organizational/Customer Requirements Defining the Rules of Engagement Footprinting and Gathering Intelligence Evaluating Human and Physical Vulnerabilities

5 6

Preparing the Vulnerability Scan

Scanning Logical Vulnerabilities

7

Analyzing Scanning Results

8

Avoiding Detection and Covering Tracks

9

Exploiting the LAN and Cloud

10

Testing Wireless Networks

Purchase PenTest+ Here

11

Targeting Mobile Devices

BUY NOW

Attacking Specialized Systems

12 14 13 15 16 17 18 19 20

Web Application-Based Attacks

PenTest+ demonstrates knowledge beyond entry-level and that the individual is competent to add value within a pen tester team immediately; this person can hit the ground running. Gavin Dennis SENIOR IT SECURITY CONSULTANT “

Performing System Hacking

Scripting and Software Development

Leveraging the Attack: Pivot and Penetrate

Communicating During the PenTesting Process

Summarizing Report Components

Recommending Remediation

Performing Post-Report Delivery Activities

VIEW TABLE OF CONTENTS

Powered by