PenTest+ CompTIA (Exam PT0-001)


Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.

Tulevat päivämäärät

Jun 27 - Jul 1, 2022
09:00 - 17:00

Jul 25 - Jul 29, 2022
09:00 - 17:00

Aug 22 - Aug 26, 2022
09:00 - 17:00

Sep 19 - Sep 23, 2022
09:00 - 17:00

Oct 17 - Oct 21, 2022
09:00 - 17:00

Nov 14 - Nov 18, 2022
09:00 - 17:00

  • PenTest+ CompTIA (Exam PT0-001)
    5 days  (Instructor Led Online)  |  Network Security

    Course Details


    The PenTest+ CompTIA (Exam PT0-001) course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.

    Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and even more lucrative for those who possess these skills.

    In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.


    See other CompTIA courses


    After you complete this course, you will be able to:

    • Plan, conduct, analyze, and report on penetration tests.
    • Plan and scope penetration tests.
    • Conduct passive reconnaissance.
    • Perform non-technical tests to gather information.
    • Conduct active reconnaissance.
    • Analyze vulnerabilities.
    • Penetrate networks.
    • Exploit host-based vulnerabilities.
    • Test applications.
    • Complete post-exploit tasks.
    • Analyze and report pen test results.


    Lesson 1: Planning and Scoping Penetration Tests

    • Topic A: Introduction to Penetration Testing Concepts
    • Topic B: Plan a Pen Test Engagement
    • Topic C: Scope and Negotiate a Pen Test Engagement
    • Topic D: Prepare for a Pen Test Engagement

    Lesson 2: Conducting Passive Reconnaissance

    • Topic A: Gather Background Information
    • Topic B: Prepare Background Findings for Next Steps

    Lesson 3: Performing Non-Technical Tests

    • Topic A: Perform Social Engineering Tests
    • Topic B: Perform Physical Security Tests on Facilities

    Lesson 4: Conducting Active Reconnaissance

    • Topic A: Scan Networks
    • Topic B: Enumerate Targets
    • Topic C: Scan for Vulnerabilities
    • Topic D: Analyze Basic Scripts

    Lesson 5: Analyzing Vulnerabilities

    • Topic A: Analyze Vulnerability Scan Results
    • Topic B: Leverage Information to Prepare for Exploitation

    Lesson 6: Penetrating Networks

    • Topic A: Exploit Network-Based Vulnerabilities
    • Topic B: Exploit Wireless and RF-Based Vulnerabilities
    • Topic C: Exploit Specialized Systems

    Lesson 7: Exploiting Host-Based Vulnerabilities

    • Topic A: Exploit Windows-Based Vulnerabilities
    • Topic B: Exploit *nix-Based Vulnerabilities

    Lesson 8: Testing Applications

    • Topic A: Exploit Web Application Vulnerabilities
    • Topic B: Test Source Code and Compiled Apps

    Lesson 9: Completing Post-Exploit Tasks

    • Topic A: Use Lateral Movement Techniques
    • Topic B: Use Persistence Techniques
    • Topic C: Use Anti-Forensics Techniques

    Lesson 10: Analyzing and Reporting Pen Test Results

    • Topic A: Analyze Pen Test Data
    • Topic B: Develop Recommendations for Mitigation Strategies
    • Topic C: Write and Handle Reports
    • Topic D: Conduct Post-Report-Delivery Activities


    • This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course.
    • This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.


    To ensure your success in this course, you should have:

    • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
    • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.