Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA PenTest+ (PT0-001)

E-COURSE:

CompTIA PenTest+ (PT0-001)

Instructor-led, video based E-Learning course.
Overview

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them. PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings. Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security. CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

Instructor: Chrys Thorsen

Objectives
  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results
Prerequisites

Although not a prerequisite the CompTIA PenTest+ (PT0-001) Certification is aimed at an IT security professional who has:

  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience
Target Audience

This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management

Instructor

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. PLANNING AND SCOPING
1
Start
Overview
2
Start
Planning an Engagement
3
Start
Planning on Engagement Part 2
4
Start
Planning an Engagement Part 3
5
Start
Planning an Engagement Part 4
6
Start
Legal Concepts
7
Start
Scoping an Engagement
8
Start
Scoping an Engagement Part 2
9
Start
Compliance-Based Assessments
  1. INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
10
Start
Pentesting Tools: Use Cases
11
Start
Pentesting Tools: Use Cases Part 2
12
Start
Pentesting Tools: Scanners
13
Start
Pentesting Tools: Credential Testing
14
Start
Pentesting Tools: Credential Testing Part 2
15
Start
Pentesting Tools: Web Directory Enum
16
Start
Pentesting Tools: Debuggers
17
Start
Pentesting Tools: OSINT
18
Start
Pentesting Tools: Wireless
19
Start
Pentesting Tools: Web Proxies
20
Start
Pentesting Tools: Social Engineering
21
Start
Pentesting Tools: Remote Access
22
Start
Pentesting Tools: Networking
23
Start
Pentesting Tools: Misc
24
Start
Pentesting Tools: Mobile
25
Start
Nmap
26
Start
Common Pentest Objectives
27
Start
Analyze Scripts: Bash
28
Start
Analyze Scripts: Bash Part 2
29
Start
Analyze Scripts: Bash Part 3
30
Start
Analyze Scripts: Python
31
Start
Analyze Scripts: Python Part 2
32
Start
Analyze Scripts: Python Part 3
33
Start
Analyze Scripts: Ruby
34
Start
Analyze Scripts: Ruby Part 2
35
Start
Analyze Scripts: PowerShell
37
Start
Analyze Scripts: Powershell Part 2
46
Start
Vulnerability Scan Results
  1. ATTACKS AND EXPLOITS
38
Start
Info Gathering Techniques
39
Start
Info Gathering Techniques Part 2
40
Start
Info Gathering Techniques Part 3
41
Start
Info Gathering Techniques Part 4
42
Start
Perform Vulnerability Scans
43
Start
Perform Vulnerability Scans Part 2
44
Start
Perform Vulnerability Scans Part 3
45
Start
Perform Vulnerability Scans Part 4
47
Start
Exploration Preparation
48
Start
Exploration Preparation Part 2
49
Start
Weaknesses in Specialized Systems
50
Start
Weaknesses in Specialized Systems Part 2
  1. PENETRATION TESTING TOOLS
51
Start
Social Engineering
52
Start
Social Engineering Part 2
53
Start
Network Vulnerability: Name Resolution
54
Start
Network Vulnerability: SNMP, SMTP and FTP
55
Start
Network Vulnerability: Pass-the-Hash
56
Start
Network Vulnerabilities: MITM
57
Start
Network Vulnerability Denial of Service
58
Start
Network Vulnerabilities: NAC Bypass, VLAN Hopping
59
Start
App Vulnerabilities Injection Attacks
60
Start
App Vulnerabilities Injection Attacks Part 2
61
Start
App Vulnerabilities: Injection Attacks Part 3
62
Start
App Vulnerabilities: File Inclusions
63
Start
App Vulnerabilities: File Inclusions Part 2
64
Start
App Vulnerabilities: XSS, CSRF, Clickjacking
65
Start
App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
67
Start
App Vulnerabilities: Authentication, Authorization
68
Start
App Vulnerabilities: Insecure Coding
70
Start
Wireless and RF Vulnerabilities
71
Start
Wireless and RF Vulnerabilities Part 2
72
Start
Host-Based Vulnerabilities
73
Start
Host Based Vulnerabilities Part 2
74
Start
Host Based Vulnerabilites Part 3
75
Start
Host-Based Vulnerabilities Part 4
76
Start
Host-Based Vulnerabilities Part 5
77
Start
Site Security
78
Start
Site Security Part 2
79
Start
Post-Exploitation
80
Start
Post-Exploitation Part 2
  1. REPORTING AND COMMUNICATION
81
Start
Reports
82
Start
Post Report Activities
83
Start
Vulnerability Mitigation Strategies
84
Start
Communication Importance
E-COURSE Instructor-led, video based E-Learning course.
USD 99
  • 34:31:00
    + Hours Of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top