CompTIA PenTest Certification Training in Joliet

Enroll in or hire us to teach our CompTIA PenTest Certification class in Joliet, Illinois by calling us @303.377.6176. Like all HSG classes, CompTIA PenTest Certification may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, CompTIA PenTest Certification may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 

This CompTIA PenTest+ training class is for intermediate-skills-level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network.

This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.

Course Length: 5 Days
Course Tuition: $2090 (US)

Prerequisites

Experience in the following is required for this CompTIA class: 1. Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies. 2. Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

Course Outline

 
Planning and Scoping Penetration Tests
Introduction to Penetration Testing Concepts
Plan a Pen Test Engagement
Scope and Negotiate a Pen Test Engagement
Prepare for a Pen Test Engagement
 
Conducting Passive Reconnaissance
Gather Background Information
Prepare Background Findings for Next Steps
 
Performing Non-Technical Tests
Perform Social Engineering Tests
Perform Physical Security Tests on Facilities
 
Conducting Active Reconnaissance
Scan Networks
Enumerate Targets
Scan for Vulnerabilities
Analyze Basic Scripts
 
Analyzing Vulnerabilities
Analyze Vulnerability Scan Results
Leverage Information to Prepare for Exploitation
 
Penetrating Networks
Exploit Network-Based Vulnerabilities
Exploit Wireless and RF-Based Vulnerabilities
Exploit Specialized Systems
Exploiting Host-Based Vulnerabilities
Exploit Windows-Based Vulnerabilities
Exploit *nix-Based Vulnerabilities
 
Testing Applications
Exploit Web Application Vulnerabilities
Test Source Code and Compiled Apps
 
Completing Post-Exploit Tasks
Use Lateral Movement Techniques
Use Persistence Techniques
Use Anti-Forensics Techniques
 
Analyzing and Reporting Pen Test Results
Analyze Pen Test Data
Develop Recommendations for Mitigation Strategies
Write and Handle Reports
Conduct Post-Report-Delivery Activities

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.