CompTIA PenTest+ Training
About This Course
This CompTIA PenTest+ training course is meticulously designed to equip learners with profound knowledge and practical skills in penetration testing and vulnerability assessment. The course begins with an in-depth exploration of planning and scoping for penetration tests, ensuring alignment with organizational goals and compliance with regulatory frameworks. Participants will learn about various aspects of a pen test, including establishing rules of engagement, managing resources and budgets, understanding legal and service provider agreements, and ethical considerations. Furthermore, the course delves into the intricacies of information gathering and vulnerability scanning, where learners will gain hands-on experience with tools like Wireshark and Nmap, and understand the nuances of both passive and active reconnaissance.
Advancing to more complex topics, the course covers a range of attacks and exploits, including network-based, wireless, web, and database attacks, as well as post-exploitation strategies. Participants will be skilled in using advanced hacking methods, identifying vulnerabilities, and tailoring test plans to combat emerging hacking techniques. The final modules focus on critical post-testing processes such as report writing, presenting findings, and recommending mitigation strategies, along with an overview of essential tools and code analysis for effective penetration testing. By the end of this course, participants will be adept at conducting authorized penetration tests, analyzing incident data, and employing advanced threat modeling techniques, fully preparing them for the CompTIA PenTest+.
What You'll Learn
LO1: Design a security testing plan aligning with organizational goals, integrating key methodologies for vulnerability assessments.
LO2: Manage and implement vulnerability assessments, utilizing advanced threat modeling and source code techniques.
LO3: Conduct authorized penetration tests on complex systems using advanced hacking methods.
LO4: Analyze incident data to identify emerging trends in vulnerability exploitation and hacking techniques.
LO5: Identify the organization's systems' susceptibilities to specific hacking techniques and attacks, refining test plans to address emerging advanced hacking actions
Topics Covered
Topic 1 Planning and Scoping
Topic 2 Information Gathering and Vulnerability Scanning
Topic 3 Attacks and Exploits
Topic 4 Reporting and Communication
Topic 5 Tools and Code Analysis
Entry Requirements
Knowledge and Skills
• Able to operate computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
• Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
• Positive Learning Attitude
• Enthusiastic Learner
Experience
• Minimum of 1 year of working experience.
Target Year Group : 21-65 years old