CompTIA Private Public

CompTIA PenTest+ (PenTest) (CTIA_PENTEST)

5 days
CompTIA

Learn penetration testing concepts and methodologies aligned to CompTIA PenTest+ (PT0-003), including recon, exploitation, post-exploit tasks, and reporting.

Register or Request Training

Price per student
$3,229.10
Guaranteed to run
Select a date
Please select a class.
  • Private class for your team
  • Live expert instructor
  • Online or on‑location
  • Customizable agenda
  • Proposal turnaround within 1–2 business days

Course Overview

Penetration testing is an increasingly valuable skill as organizations work to prevent breaches and protect customer data. In this course, you will learn core concepts and methodologies related to penetration testing and work through a simulated penetration test for a fictitious company.

This course is designed for IT professionals who want to identify information-system vulnerabilities, recommend effective remediation techniques, and prepare for the CompTIA PenTest+ certification exam PT0-003 (or use PenTest+ as a foundation for more advanced security roles and certifications).

Course Benefits

  • Plan and scope penetration tests
  • Conduct passive reconnaissance
  • Perform non-technical tests to gather information
  • Conduct active reconnaissance
  • Analyze vulnerabilities
  • Penetrate networks
  • Exploit host-based vulnerabilities
  • Test applications
  • Complete post-exploitation tasks
  • Analyze and report penetration test results

Delivery Methods

Public Class
Live expert-led online training from anywhere. Guaranteed to run .
Private Class
Delivered for your team at your site or online.

Course Outline

  1. Scoping Organization/Customer Requirements
  2. Defining the Rules of Engagement
  3. Footprinting and Gathering Intelligence
  4. Evaluating Human and Physical Vulnerabilities
  5. Preparing the Vulnerability Scan
  6. Scanning Logical Vulnerabilities
  7. Analyzing Scanning Results
  8. Avoiding Detection and Covering Tracks
  9. Exploiting the LAN and Cloud
  10. Testing Wireless Networks
  11. Targeting Mobile Devices
  12. Attacking Specialized Systems
  13. Web Application-Based Attacks
  14. Performing System Hacking
  15. Scripting and Software Development
  16. Leveraging the Attack: Pivot and Penetrate
  17. Communicating During the PenTesting Process
  18. Summarizing Report Components
  19. Recommending Remediation
  20. Performing Post-Report Delivery Activities

Class Materials

Each student receives a comprehensive set of materials, including course notes and all class examples.

Have questions about this course?

We can help with curriculum details, delivery options, pricing, or anything else. Reach out and we’ll point you in the right direction.

}