CompTIA Pentest+ ( PT0-002)
CompTIA Pentest+ ( PT0-002) Course Overview
Enroll for 5-day CompTIA Pentest+ (PT0-002) direction from The Edu Plus authorized with the aid of using CompTIA. In this direction you may research contemporary pen checking out techniques, assault surfaces, vulnerability control, post-transport and compliance tasks. The CompTIA PenTest+ certification is a vendor-neutral, the world over focused validation of intermediate-stage penetration checking out (or pen checking out) know-how and capabilities.
The capabilities included with the aid of using CompTIA PenTest+ assist agencies observe regulations, which include PCI-DSS and NIST 800-fifty three Risk Management Framework (RMF), which require pen tests, vulnerability checks and reports. CompTIA PenTest+ is authorised beneathneath the Department of Defense (DoD) Directive 8140/8570.01-M and beneathneath ANSI/ISO wellknown 17024.
The new CompTIA PenTest+ (PT0-002) specializes in the maximum updated and present day capabilities wished for the subsequent tasks:
Planning and scoping a penetration checking out engagement
Understanding criminal and compliance requirements
Performing vulnerability scanning and penetration checking out the usage of suitable gear and techniques, after which studying the consequences
Producing a written record containing proposed remediation techniques, successfully speaking consequences to the control group and supplying realistic recommendations
CompTIA Pentest+ ( PT0-002) Course Overview
Enroll for 5-day CompTIA Pentest+ (PT0-002) path from The Edu Plus authorized with the aid of using CompTIA. In this path you may research modern-day pen trying out techniques, assault surfaces, vulnerability control, post-transport and compliance tasks. The CompTIA PenTest+ certification is a vendor-neutral, the world over focused validation of intermediate-degree penetration trying out (or pen trying out) understanding and capabilities.
The capabilities protected with the aid of using CompTIA PenTest+ assist organizations observe regulations, which includes PCI-DSS and NIST 800-fifty three Risk Management Framework (RMF), which require pen tests, vulnerability tests and reports. CompTIA PenTest+ is authorized below the Department of Defense (DoD) Directive 8140/8570.01-M and below ANSI/ISO widespread 17024.
The new CompTIA PenTest+ (PT0-002) specializes in the maximum updated and modern-day capabilities wanted for the subsequent tasks:
Planning and scoping a penetration trying out engagement
Understanding prison and compliance requirements
Performing vulnerability scanning and penetration trying out the usage of suitable equipment and techniques, after which studying the effects
Producing a written file containing proposed remediation techniques, efficaciously speaking effects to the control crew and presenting sensible recommendations
Module 1: Planning and Scoping
- Compare and contrast governance, risk, and compliance concepts.
- Explain the importance of scoping and organizational/customer requirements.
- Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
- Given a scenario, perform passive reconnaissance
- Given a scenario, perform active reconnaissance
- Given a scenario, analyze the results of a reconnaissance exercise
- Given a scenario, perform vulnerability scanning
- Given a scenario, research attack vectors and perform network attacks.
- Given a scenario, research attack vectors and perform wireless attacks.
- Given a scenario, research attack vectors and perform application-based attacks
- Given a scenario, research attack vectors and perform attacks on cloud technologies.
- Explain common attacks and vulnerabilities against specialized systems
- Given a scenario, perform a social engineering or physical attack.
- Given a scenario, perform post-exploitation techniques.
- Compare and contrast important components of written reports.
- Given a scenario, analyze the findings and recommend the appropriate remediation within a report.
- Explain the importance of communication during the penetration testing process.
- Explain post-report delivery activities.
- Explain the basic concepts of scripting and software development
- Given a scenario, analyze a script or code sample for use in a penetration test.
- Explain use cases of the following tools during the phases of a penetration test.
Learning Objectives:
After completing this course, you will be able to:
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Conduct information gathering using appropriate techniques
- Perform a vulnerability scan.
- Analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Exploit network-based vulnerabilities
- Exploit wireless and RF-based vulnerabilities
- Exploit application-based vulnerabilities
- Exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Perform post-exploitation techniques
- Use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Analyse tool output or data related to a penetration test
- Analyse a basic script (limited to Bash, Python, Ruby, and PowerShell) Reporting and Communication
- Use report writing and handling best practices
- Explain post-report delivery activities
- Recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process
Write a review
$649 – $1,899
Reviews
There are no reviews yet.