PenTest+

Is This for You?

This course is designed for IT professionals seeking to learn vulnerability assessment from a broad, comprehensive perspective.

Award and Associated Qualifications

cpd

Awarded 40 CPD points upon successful completion

About This Course

In this course, you’ll learn valuable pen testing skills for the cloud, hybrid environments, web applications, and traditional on-premise systems. You’ll cover hands-on vulnerability assessment, scanning, and analysis, as well as planning, scoping, and managing infrastructure weaknesses.

You’ll learn how to perform vulnerability scanning and passive / active reconnaissance. You’ll also learn about vulnerability management, as well as how to analyse the results of reconnaissance exercises.

You’ll learn how to prepare for network attacks, wireless attacks, application-based attacks, and attacks on cloud technologies. You’ll also develop the skills needed to perform post-exploitation analysis.

The course will also help prepare you for the CompTIA PenTest+ (PT0-002) certification exam.

COURSE CONTENT

Module 1 – Scoping & Engagement

Module 2 – Professionalism & Integrity

Module 3 – Passive Reconnaissance

Module 4 – Active Reconnaissance

Module 5 – Vulnerability Scanning

Module 6 – Network Attacks & Exploits

Module 7 – Wireless Attacks

Module 8 – Application-based Attacks

Module 9 – Attacks on Cloud Technologies

Module 10 – Attacks on Specialised Systems

Module 11 – Social Engineering Attacks

Module 12 – Post-exploitation Techniques

Module 13 – Written Reports

Module 14 – Communication & Post-Report Activities

Module 15 – Analysing Tool & Script Output

Module 16 – Penetration Testing Tools

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.

Aims and Objectives

This course will prepare you for roles of greater responsibility in IT security, as well as for CompTIA’s PenTest+ certification exam.

Pre-Requisites

Network+ or Security+ or equivalent background with 3-4 years in information security or related experience.

Finance Options

Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –

Self-Funded:

  • Flexible payment plans to help you spread the cost* available at many of our centres;
  • You could opt to pay upfront.

Company Funded:

Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.

What we can help with:

  • Providing a comprehensive training programme outlining learning outcomes
  • Tailored personnel letters
  • Communication with finance departments to arrange payment options (upfront or payment plan*).

Funding & Grants:

There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.

We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.

* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.

Career Path

This course and associated certification will stand you in good stead in roles that involve analysing, monitoring, and protecting an organisation’s infrastructure.