Aaralias Technologies

CompTIA PenTest+ Certification Prep (Exam PT0-002)

Overview

Develop the critical skills required to identify security vulnerabilities in networks. CompTIA PenTest+ course takes learners through the techniques and tools used for penetration testing, analyzing compliance needs, checking test results, developing reports, and making suggestions to management.

About the course

The CompTIA PenTest+ Certification Prep (Exam PT0-002) course prepares you for real-world penetration testing by covering key areas like network attacks, wireless exploits, and Code Analysis. You’ll learn to perform reconnaissance, exploit vulnerabilities, and deliver detailed reports. This PenTest+ course emphasizes the use of penetration testing tools and ethical hacking practices. Enroll in the CompTIA PenTest+ Training to master the skills needed for the Exam PT0-002 and become a certified penetration tester.

Course Objectives

  • Plan and scope an assessment
  • Understand legal and compliance requirements
  • Perform vulnerability scanning and penetration testing using appropriate tools and techniques
  • Analyze the results
  • Produce a written report containing proposed remediation techniques
  • Effectively communicate results to management
  • Provide practical recommendations

Course content

Course Outline

Planning and Scoping

  • Compare and contrast governance, risk, and compliance concepts
  • Explain the importance of scoping and organizational/customer requirements
  • Demonstrate an ethical hacking mindset by maintaining professionalism and integrity

Information Gathering and Vulnerability Scanning

arrow icon
  • Perform passive reconnaissance
  • perform active reconnaissance
  • Analyze the results of a reconnaissance exercise
  • Perform vulnerability scanning
  • Research attack vectors and perform network attacks
  • Research attack vectors and perform wireless attacks
  • Research attack vectors and perform application-based attacks
  • Research attack vectors and perform attacks on cloud technologies
  • Explain common attacks and vulnerabilities against specialized systems
  • Perform a social engineering or physical attack
  • Perform post-exploitation techniques
  • Compare and contrast important components of written reports
  • Analyze the findings and recommend the appropriate remediation within a report
  • Explain the importance of communication during the penetration testing process
  • Explain post-report delivery activities

Tools and Code Analysis

  • Explain the basic concepts of scripting and software development
  • Analyze a script or code sample for use in a penetration test
  • Explain use cases of the following tools during the phases of a penetration test