CompTIA® PenTest+ Complete Course, Labs, & Practice Exams

CompTIA® PenTest+ Complete Course, Labs, & Practice Exams

You will learn the details of how to conduct a penetration test so that you can be better prepared to serve on your organization's cyber defense team or as an independent penetration tester.

Course Details

$399USD

Course Highlights

  • Course Price$399
  • InstructorsJason Dion
  • Total Duration32h 44m
  • Total Lessons291
  • Total Quizzes12
  • Total Enrollments143 Students
  • Access to material12 Months
  • Official LabsIncluded
  • Official TextbookIncluded
  • Full Practice ExamsIncluded
  • 100% Pass GuaranteeIncluded

Meet Your Instructor

Disclaimer

Prices may vary depending on local currency and exchange rates.

License

Description

Dive into the intricate world of penetration testing with this comprehensive course designed to make you proficient in conducting penetration tests. Whether you are part of your organization's cyber defense team or an aspiring independent penetration tester, this course is your gateway to mastering the art of cybersecurity.

Aiming to prepare you for the intermediate-level CompTIA PenTest+ (PT0-002) certification, this course validates your ability to plan, scope, conduct, analyze, and report on penetration tests. It delves into the technical and hands-on aspects of cybersecurity, teaching you how to emulate cyber threats, infiltrate secure network architectures, and understand the legal and compliance requirements associated with penetration testing.

Designed for a range of professionals, including security analysts, penetration testers, and network security operations personnel, this course covers all five domains of the CompTIA PenTest+ exam:

  • Planning and Scoping (14%)
  • Information Gathering and Vulnerability Identification (22%)
  • Attacks and Exploits (30%)
  • Reporting and Communication (18%)
  • Tools and Code Analysis (16%)

By the end of this course, you’ll be equipped with the knowledge and skills to take on advanced roles in cybersecurity teams and be well-prepared for the CompTIA PenTest+ (PT0-002) certification exam.

Learning Objectives:

  • Grasp the penetration testing methodology and how to plan and scope a test
  • Conduct information gathering, enumeration, and exploit networks and systems
  • Analyze, prepare reports, and effectively communicate findings
  • Achieve proficiency in using tools and conducting code analysis

Who this course is for:

  • Aspiring and current Security Analysts, Penetration Testers, Vulnerability Testers
  • Network Security Operations personnel
  • Students preparing for the CompTIA PenTest+ (PT0-002) Certification Exam

Course Overview:

Immerse yourself in the detailed process of conducting penetration tests and enhance your skills to serve in cybersecurity roles, all while preparing for the CompTIA PenTest+ (PT0-002) certification exam.

Prerequisites:

  • Basic understanding of networks and network security
  • Familiarity with concepts covered by the Network+ and Security+ exams.

Course Outline:

Frequently Asked Questions

No.TitleTypeStatus
1.WelcomeVIDEO
2.Download your free study guidePDF
3.Exam TipsVIDEO
4.How to Use the Lab EnvironmentVIDEO
5.Labs: Exploring the PenTest+ Lab EnvironmentLAB
6.100% Pass GuaranteeVIDEO
7.Checkpoint: WelcomeQUIZ
No.TitleTypeStatus
1.Planning an EngagementVIDEO
2.RiskVIDEO
3.Risk HandlingVIDEO
4.ControlsVIDEO
5.PenTest MethodologiesVIDEO
6.PenTest StandardsVIDEO
7.Planning a TestVIDEO
8.Legal ConceptsVIDEO
9.Regulatory ComplianceVIDEO
10.ProfessionalismVIDEO
11.Checkpoint: Planning an EngagementQUIZ
No.TitleTypeStatus
1.Scoping an EngagementVIDEO
2.Defining the ScopeVIDEO
3.Adversary EmulationVIDEO
4.Target ListVIDEO
5.Identifying RestrictionsVIDEO
6.Rules of EngagementVIDEO
7.Assessment TypesVIDEO
8.Validating the ScopeVIDEO
9.Limitations and PermissionVIDEO
10.Build a Virtual LabVIDEO
11.Checkpoint: Scoping an EngagementQUIZ
No.TitleTypeStatus
1.Passive ReconnaissanceVIDEO
2.Information GatheringVIDEO
3.Open-Source Intelligence (OSINT)VIDEO
4.Social Media ScrapingVIDEO
5.OSINT ToolsVIDEO
6.Using OSINT ToolsVIDEO
7A.Lab: Discovering IoT devices with ShodanVIDEO
8.DNS InformationVIDEO
9A.Lab: Exploring the Domain Tools: Nslookup, Dig, and WhoisLAB
10.Reconnaissance with CentralOpsVIDEO
11.Public RepositoriesVIDEO
12.Search Engine AnalysisVIDEO
13.URL AnalysisVIDEO
14A.Lab: Navigating Open-Source Intelligence ToolsVIDEO
15.Cryptographic FlawsVIDEO
16.CWE & CVEVIDEO
17.Checkpoint: Passive ReconnaissanceQUIZ
No.TitleTypeStatus
1.Active ReconnaissanceVIDEO
2.Scanning and EnumerationVIDEO
3.Conducting EnumerationVIDEO
4.Other EnumerationVIDEO
5A.Lab: Demonstrating Enumeration TechniquesVIDEO
6.Website ReconnaissanceVIDEO
7.Detecting and Evading DefensesVIDEO
8.Packet CraftingVIDEO
9.EavesdroppingVIDEO
10.WardrivingVIDEO
11.DNS and ARP AnalysisVIDEO
12.Network Traffic AnalysisVIDEO
13.Checkpoint: Active ReconnaissanceQUIZ
No.TitleTypeStatus
1.Vulnerability ScanningVIDEO
2.Vulnerability LifecycleVIDEO
3.Vulnerability ScansVIDEO
4.Scanning ConsiderationsVIDEO
5.Nessus ScanningVIDEO
6.OpenVas ScanningVIDEO
7A.Lab: Exploring OpenVASLAB
8.Nikto ScanningVIDEO
9A.Lab: Using Web ScannersLAB
10.Checkpoint: Vulnerability ScanningQUIZ
No.TitleTypeStatus
1.NmapVIDEO
2.Nmap Discovery ScansVIDEO
3.Nmap Port ScansVIDEO
4.Nmap FingerprintingVIDEO
5.Using NmapVIDEO
6A.Lab: Understanding Nmap Common UsageLAB
7.Nmap Scripting EngineVIDEO
8A.Lab: Scanning a Vulnerable SystemLAB
8B.Lab: Understanding Scan OutputLAB
9.Checkpoint: NmapQUIZ
No.TitleTypeStatus
1.Social Engineering and Physical AttacksVIDEO
2.Methods of InfluenceVIDEO
3.Social EngineeringVIDEO
4.Phishing CampaignsVIDEO
5.Social Engineering ToolkitVIDEO
6A.Lab: Understanding Social Engineering Toolkit (SET)LAB
7.PretextingVIDEO
8.Baiting VictimsVIDEO
9.ImpersonationVIDEO
10A.Lab: Understanding Spearphishing and Credentials AttackLAB
11.Physical SecurityVIDEO
12.Lock PickingVIDEO
13.Physical AttacksVIDEO
14.Social Engineering ToolsVIDEO
15.Checkpoint: Social Engineering and Physical AttacksQUIZ
No.TitleTypeStatus
1.Wireless AttacksVIDEO
2.Wireless SecurityVIDEO
3.Bypassing MAC FilteringVIDEO
4.Signal ExploitationVIDEO
5.WEP HackingVIDEO
6.WPA/WPA2 HackingVIDEO
7.WPS PIN AttacksVIDEO
8A.Lab: Monitoring with Aircrack-ngLAB
9.Evil TwinsVIDEO
10.On-path and Relay AttacksVIDEO
11.Bluetooth AttacksVIDEO
12.RFID and NFC AttacksVIDEO
13.Checkpoint: Wireless AttacksQUIZ
No.TitleTypeStatus
1.Network AttacksVIDEO
2.Stress TestingVIDEO
3.Exploit ResourcesVIDEO
4.ARP PoisoningVIDEO
5.DNS Cache PoisoningVIDEO
6.LLMNR/NBT-NS PoisoningVIDEO
7.MAC SpoofingVIDEO
8.VLAN HoppingVIDEO
9.NAC BypassVIDEO
10.On-path AttackVIDEO
11.Password AttacksVIDEO
12A.Lab: Exploring Password Attacks with John the Ripper and HydraLAB
13.Pass the HashVIDEO
14A.Lab: Exploring the Basics of MetasploitLAB
15.Intro to MetasploitVIDEO
16.NetcatVIDEO
17.Using NetcatVIDEO
18.Checkpoint: Network AttacksQUIZ
No.TitleTypeStatus
1.Application VulnerabilitiesVIDEO
2.Race ConditionsVIDEO
3.Buffer OverflowsVIDEO
4.Buffer Overflow AttacksVIDEO
5.Authentication and ReferencesVIDEO
6.Improper Error HandlingVIDEO
7.Improper HeadersVIDEO
8.Code SigningVIDEO
9.Vulnerable ComponentsVIDEO
10.Software CompositionVIDEO
11.Privilege EscalationVIDEO
12.Conducting Privilege EscalationVIDEO
13.Checkpoint: Application VulnerabilitiesQUIZ
No.TitleTypeStatus
1.Application AttacksVIDEO
2.Directory TraversalsVIDEO
3.DirbusterVIDEO
4.Cross-Site Scripting (XSS)VIDEO
5.Cross-Site Request Forgery (CSRF)VIDEO
6.SQL InjectionsVIDEO
7.Conducting SQL InjectionsVIDEO
8.Burp Suite and SQLmapVIDEO
9A.Lab: Using SQL InjectionLAB
10.OWASP ZAPVIDEO
11.XML InjectionsVIDEO
12.Other Injection AttacksVIDEO
13.Attacking Web ApplicationsVIDEO
14.Checkpoint: Application AttacksQUIZ
No.TitleTypeStatus
1.Cloud AttacksVIDEO
2.Attacking the CloudVIDEO
3.Credential HarvestingVIDEO
4.Misconfigured AssetsVIDEO
5.Metadata Service AttackVIDEO
6.Software Development Kit (SDK)VIDEO
7.Auditing the CloudVIDEO
8.Conducting Cloud AuditsVIDEO
9A.Lab: Using VSFTP Manual and MetasploitLAB
10.Checkpoint: Cloud AttacksQUIZ
No.TitleTypeStatus
1.Attacks on Mobile DevicesVIDEO
2.Enterprise Mobility ManagementVIDEO
3.Deployment OptionsVIDEO
4.Mobile Reconnaissance ConcernsVIDEO
5.Mobile Device InsecurityVIDEO
6.Multifactor AuthenticationVIDEO
7.Mobile Device AttacksVIDEO
8.Malware AnalysisVIDEO
9.Conducting Malware AnalysisVIDEO
10.Mobile Device ToolsVIDEO
11.Checkpoint: Attacks on Mobile DevicesQUIZ
No.TitleTypeStatus
1.Attacks on Specialized SystemsVIDEO
2.Internet of Things (IoT) DevicesVIDEO
3.Internet of Things (IoT) VulnerabilitiesVIDEO
4.Embedded SystemsVIDEO
5.ICS and SCADA DevicesVIDEO
6.ICS Protocols and VulnerabilitiesVIDEO
7.Data Storage VulnerabilitiesVIDEO
8.Virtual EnvironmentsVIDEO
9.Virtual Machine AttacksVIDEO
10.ContainerizationVIDEO
11.Checkpoint: Attacks on Specialized SystemsQUIZ
No.TitleTypeStatus
1.Post-exploitationVIDEO
2.Enumerating the NetworkVIDEO
3.Network Segmentation TestingVIDEO
4.Lateral Movement and PivotingVIDEO
5.Pass the HashVIDEO
6.Golden TicketVIDEO
7.Lateral MovementVIDEO
8.PivotingVIDEO
9.Escalating PrivilegesVIDEO
10.Upgrading Restrictive ShellsVIDEO
11.Checkpoint: Post-exploitationQUIZ
No.TitleTypeStatus
1.Detection AvoidanceVIDEO
2.Trojans and BackdoorsVIDEO
3.Creating PersistenceVIDEO
4A.Lab: Using Reverse and Bind ShellsLAB
5.Living Off the LandVIDEO
6.Data ExfiltrationVIDEO
7.Covert ChannelsVIDEO
8.SteganographyVIDEO
9A.Lab: Navigating Steganography ToolsLAB
10.Covering Your TracksVIDEO
11.Persistence and Covering Your TracksVIDEO
12.Post-Exploitation ToolsVIDEO
13.Checkpoint: Post-exploitationQUIZ
No.TitleTypeStatus
1.Communication and ReportsVIDEO
2.Communication PathsVIDEO
3.Communication TriggersVIDEO
4.Reasons for CommunicationVIDEO
5.Presentation of FindingsVIDEO
6.Report Data GatheringVIDEO
7.Written ReportsVIDEO
8.Common ThemesVIDEO
9.Securing and Storing ReportsVIDEO
10.Checkpoint: Communication and ReportsQUIZ
No.TitleTypeStatus
1.Findings and RemediationsVIDEO
2.Security Control CategoriesVIDEO
3.Selecting Security ControlsVIDEO
4.Physical ControlsVIDEO
5.Operational ControlsVIDEO
6.Admnistrative ControlsVIDEO
7.System HardeningVIDEO
8.Secure CodingVIDEO
9.Implementing MFAVIDEO
10.Digital CertificatesVIDEO
11.Other Technical ControlsVIDEO
12.Mitigation StrategiesVIDEO
13.Checkpoint: Findings and RemediationsQUIZ
No.TitleTypeStatus
1.Post-report ActivitiesVIDEO
2.Remove Shells and ToolsVIDEO
3.Delete Test CredentialsVIDEO
4.Destroy Test DataVIDEO
5.Client AcceptanceVIDEO
6.Attestation of FindingsVIDEO
7.Lessons LearnedVIDEO
8.RetestingVIDEO
9.Checkpoint: Post-report ActivitiesQUIZ
No.TitleTypeStatus
1.Scripting BasicsVIDEO
2.Shells and Programming LanguagesVIDEO
3.VariablesVIDEO
4.LoopsVIDEO
5.Logic ControlVIDEO
6.Data StructuresVIDEO
7.Object Oriented ProgrammingVIDEO
8.Checkpoint: Scripting BasicsQUIZ
No.TitleTypeStatus
1.Analyzing ScriptsVIDEO
2.Coding in BashVIDEO
3.Bash ExampleVIDEO
4.Coding in PowerShellVIDEO
5.PowerShell ExampleVIDEO
6.Coding in PythonVIDEO
7.Python ExampleVIDEO
8.Coding in PerlVIDEO
9.Perl ExampleVIDEO
10.Coding in JavaScriptVIDEO
11.JavaScript ExampleVIDEO
12.Coding in RubyVIDEO
13.Ruby ExampleVIDEO
14A.Lab: Exploring Programming ShellsLAB
15.Checkpoint: Analyzing ScriptsQUIZ
No.TitleTypeStatus
1.Exploits and AutomationVIDEO
2.Exploits to Download FilesVIDEO
3.Exploits for Remote AccessVIDEO
4.Exploits for Enumerating UsersVIDEO
5.Exploits for Enumerating AssetsVIDEO
6A.Lab: Analyzing Exploit CodeLAB
7.Automation in EngagementsVIDEO
8.Automation with Nmap ScriptsVIDEO
9A.Lab: Applying PenTest AutomationLAB
10.Checkpoint: Exploits and AutomationQUIZ
No.TitleTypeStatus
1.Tool Round-upVIDEO
2.OSINT ToolsVIDEO
3.Scanning ToolsVIDEO
4.Networking ToolsVIDEO
5.Wireless ToolsVIDEO
6.Social Engineering ToolsVIDEO
7.Remote Access ToolsVIDEO
8.Credential Testing ToolsVIDEO
9.Web Application ToolsVIDEO
10.Cloud ToolsVIDEO
11.Steganography ToolsVIDEO
12.DebuggersVIDEO
13.Miscellaneous ToolsVIDEO
14A.Lab: Understanding Spear Phishing and Credentials AttackLAB
15.Checkpoint: Tool Round-upQUIZ
No.TitleTypeStatus
1.Conclusion LessonVIDEO
2.BONUS: Where to go from here?VIDEO
3.Practice Exam (PT0-002)EXAM

Customer Reviews

Review Avatar Image

JB Lex

confidential

5 out of 5 stars

Superb training delivery, content, and mock exams. Passed exam on first try!
Review Avatar Image

Abhijit Bhattacharyya

confidential

5 out of 5 stars

I took Jason's training course through my organization to pass the exam on 1st attempt. Great examples were used to make the concepts clear. The delivery of training is superb. Practice tests are in line with the actual exam and come with clear explanations. Thank you Jason for such great material. You are an awesome instructor.
ato Comptia Logo
Accredited Training Organization
Dion Training is an Platinum Partner for CompTIA certification exams.

All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.

60 Day Money Back Guarantee

100% Pass Guarantee

All the risk is on us, as it should be. You literally have nothing to lose.

We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you complete our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and completing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.