CompTIA PenTest+ Online Courses

CompTIA PenTest+ (PT0-001) Online Course in Namibia

 

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. 2KO's online courses are also available as full-time instructor led courses in Windhoek, giving our students hands on skills to help prepare for International IT certification exams. 2KO Africa offers IT consulting, technical IT services and top-of-the-range IT training on multiple platforms. Our best-of-breed computer courses are presented as instructor led classes or as online internet-based elearning. from the comfort of home or work.

 

Overview
CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings. Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security. CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program.

 

Objectives
Planning and Scoping Penetration Tests
Conducting Passive Reconnaissance
Performing Non-Technical Tests
Conducting Active Reconnaissance
Analyzing Vulnerabilities
Penetrating Networks
Exploiting Host-Based Vulnerabilities
Testing Applications
Completing Post-Exploit Tasks
Analyzing and Reporting Pen Test Results

Prerequisites
Although not a prerequisite the CompTIA PenTest+ (PT0-001) Certification is aimed at an IT security professional who has:
Network+, Security+ or equivalent knowledge
Minimum of 3-4 years of hands-on information security or related experience

Target Audience
This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management
 

To buy a course now using Credit Card, click the icon below

 

Course Curriculum
Planning And Scoping
Overview

Planning An Engagement
Planning On Engagement Part 2
Planning An Engagement Part 3
Planning An Engagement Part 4
Overview
Planning An Engagement
Planning On Engagement Part 2
Planning An Engagement Part 3
Planning An Engagement Part 4
Legal Concepts
Scoping An Engagement
Scoping An Engagement Part 2
Compliance-Based Assessments

Information Gathering And Vulnerability Identification
Pentesting Tools: Use Cases
Pentesting Tools: Use Cases Part 2
Pentesting Tools: Scanners
Pentesting Tools: Credential Testing
Pentesting Tools: Credential Testing Part 2
Pentesting Tools: Web Directory Enum
Pentesting Tools: Debuggers
Pentesting Tools: Osint
Pentesting Tools: Wireless
Pentesting Tools: Web Proxies
Pentesting Tools: Social Engineering
Pentesting Tools: Remote Access
Pentesting Tools: Networking
Pentesting Tools: Misc
Pentesting Tools: Mobile
Nmap
Common Pentest Objectives
Analyze Scripts: Bash
Analyze Scripts: Bash Part 2
Analyze Scripts: Bash Part 3
Analyze Scripts: Python
Analyze Scripts: Python Part 2
Analyze Scripts: Python Part 3
Analyze Scripts: Ruby
Analyze Scripts: Ruby Part 2
Analyze Scripts: Powershell
Analyze Scripts: Powershell Part 2
Vulnerability Scan Results

Attacks And Exploits
Info Gathering Techniques
Info Gathering Techniques Part 2
Info Gathering Techniques Part 3
Info Gathering Techniques Part 4
Perform Vulnerability Scans
Perform Vulnerability Scans Part 2
Perform Vulnerability Scans Part 3
Perform Vulnerability Scans Part 4
Exploration Preparation
Exploration Preparation Part 2
Weaknesses In Specialized Systems
Weaknesses In Specialized Systems Part 2

Penetration Testing Tools
Social Engineering
Social Engineering Part 2
Network Vulnerability: Name Resolution
Network Vulnerability: Snmp, Smtp And Ftp
Network Vulnerability: Pass-The-Hash
Network Vulnerabilities: Mitm
Network Vulnerability Denial Of Service
Network Vulnerabilities: Nac Bypass, Vlan Hopping
App Vulnerabilities Injection Attacks
App Vulnerabilities Injection Attacks Part 2
App Vulnerabilities: Injection Attacks Part 3
App Vulnerabilities: File Inclusions
App Vulnerabilities: File Inclusions Part 2
App Vulnerabilities: Xss, Csrf, Clickjacking
App Vulnerabilities: Xss, Csrf, Clickjacking Pt2
App Vulnerabilities: Authentication, Authorization
App Vulnerabilities: Insecure Coding
Wireless And Rf Vulnerabilities
Wireless And Rf Vulnerabilities Part 2
Host-Based Vulnerabilities
Host Based Vulnerabilities Part 2
Host Based Vulnerabilites Part 3
Host-Based Vulnerabilities Part 4
Host-Based Vulnerabilities Part 5
Site Security
Site Security Part 2
Post-Exploitation
Post-Exploitation Part 2

Reporting And Communication
Reports
Post Report Activities
Vulnerability Mitigation Strategies
Communication Importance
 

Details about this course
Over 35 hours of learning
Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)