Course Description
“To ensure your success in this course, you should have:
Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.
Program Objectives
After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to…
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conductive active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test applications Complete post-exploit tasks
- Analyze and report pen test results
Prerequisites
-
CompTIA Security+ Certification
-
HS Diploma/GED
Exam Details
Number of Questions: 85 questions
Type of Questions: Multiple-choice and performance-based
Length of Test: 165Minutes
Passing Score: 750 (on a scale of 100-900)
Recommended Experience
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
Course Features
- Lectures 36
- Quizzes 0
- Duration 40 Hours
- Skill level All levels
- Language English
- Students 284
- Certificate Yes
- Assessments Yes
Curriculum
- 5 Sections
- 36 Lessons
- 365 Days
- Domain 1 : Planning and Scoping.4
- 1.1Compare and contrast governance, risk, and compliance concepts.30 Minutes
- 1.2Explain the importance of scoping and organizational/customer requirements Part 1.39 Minutes
- 1.3Demonstrate an ethical hacking mindset by maintaining professionalism and integrity.11 Minutes
- 1.4Explain the importance of scoping and organizational/customer requirements Part 2.17 Minutes
- Domain 2 : Information Gathering and Vulnerability Scanning.7
- 2.1Perform passive reconnaissance Part 1.
- 2.2Perform active reconnaissance Part 1.13 Minutes
- 2.3Analyze the results of a reconnaissance exercise.30 Minutes
- 2.4Perform vulnerability scanning.22 Minutes
- 2.5Perform passive reconnaissance Part 2.29 Minutes
- 2.6Perform passive reconnaissance Part 3.29 Minutes
- 2.7Perform active reconnaissance Part 2.50 Minutes
- Domain 3 : Attacks and Exploits.16
- 3.1Research attack vectors and perform network attacks Part 1.22 Minutes
- 3.2Research attack vectors and perform wireless attacks Part 1.33 Minutes
- 3.3Research attack vectors and perform application-based attacks Part 1.17 Minutes
- 3.4Research attack vectors and perform attacks on cloud technologies Part 1.32 Minutes
- 3.5Explain common attacks and vulnerabilities against specialized systems Part 1.30 Minutes
- 3.6Perform a social engineering or physical attack.31 Minutes
- 3.7Perform post-exploitation techniques Part 1.33 Minutes
- 3.8Research attack vectors and perform wireless attacks Part 2.29 Minutes
- 3.9Research attack vectors and perform application-based attacks Part 2.31 Minutes
- 3.10Research attack vectors and perform application-based attacks Part 3.31 Minutes
- 3.11Research attack vectors and perform attacks on cloud technologies Part 2.23 Minutes
- 3.12Explain common attacks and vulnerabilities against specialized systems Part 2.31 Minutes
- 3.13Explain common attacks and vulnerabilities against specialized systems Part 3.23 Minutes
- 3.14Perform post-exploitation techniques Part 2.21 Minutes
- 3.15Research attack vectors and perform network attacks Part 2.23 Minutes
- 3.16Research attack vectors and perform application-based attacks Part 4.21 Minutes
- Domain 4 : Reporting and Communication.4
- 4.1Analyze the findings and recommend the appropriate remediation within a report.27 Minutes
- 4.2Explain the importance of communication during the penetration testing process.15 Minutes
- 4.3Explain post-report delivery activities.
- 4.4Compare and contrast important components of written reports.23 Minutes
- Domain 5 : Tools and Code Analysis.5
- 5.1Explain the basic concepts of scripting and software development.
- 5.2Analyze a script or code sample for use in a penetration test Part 1.36 Minutes
- 5.3Explain use cases of the following tools during the phases of a penetration test Part 1.31 Minutes
- 5.4Analyze a script or code sample for use in a penetration test Part 2.22 Minutes
- 5.5Explain use cases of the following tools during the phases of a penetration test Part 2.29 Minutes