Course description
CompTIA Official Security+ (PT-01/02) Hands-on | Instructor-Led
Fortray’s CompTIA Pentest+ is a vendor-neutral network certification for IT Security professionals. According to CompTIA, the exam “proves the Advanced knowledge and skills. Pentest+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection.
The CompTIA Pentest+ certification CompTIA Pentest+ is the Intermediate level security certification IT professionals should earn. It establishes the advance knowledge required of any cybersecurity role and provides a authentication to intermediate-level cybersecurity jobs. Pentest+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Pentest+ know how to address security incidents.
This course is designed for penetration testers, IT Security analysts, vulnerability analysts and testers, network security operations personnel, or anyone who is trying to get a better understanding of the concepts involved in conducting a penetration test and its associated toolsets.
Fortray Pentest+ will ensure that the learner gains extensive hands-on experience on the Real & Licensed hardware along with an industry-experienced trainer with only one vision in mind.
Upcoming start dates
Suitability - Who should attend?
Pre-Requisites
There is no official prerequisite for this course. But we highly recommend participants should have basic computer knowledge. Ideally, they should have network+
Outcome / Qualification etc.
What skills will you learn?
- Threats, Attacks & Vulnerabilities
- Technologies & Tools
- Architecture & Design
- Security Architechture and Tool Set
- Identity & Access Management
- Risk Management
- Cryptography & Pki
Training Course Content
Planning and Scoping
- Lecture1.1 Planning and Scoping overview
- Lecture1.2 Penetration Testing methodologies
- Lecture1.3 Planning a Penetration Test
- Lecture1.4 Rules of Engagement
- Lecture1.5 Legal Concepts
- Lecture1.6 Testing Strategies
- Lecture1.7 White Box Support Resources
- Lecture1.8 Types of Assessments
- Lecture1.9 Threat Actors
- Lecture1.10 Target Selection
- Lecture1.11 Other Scoping Considerations
Information Gathering and Vulnerability Identification
- Lecture2.1 Information Gathering and Vulnerability Identification (Overview)
- Lecture2.2 Information Gathering
- Lecture2.3 Reconnaissance with CentralOps (Demo)
- Lecture2.4 Scanning and Enumeration
- Lecture2.5 Fingerprinting
- Lecture2.6 Scanning and Enumeration (Demo)
- Lecture2.7 Cryptographic Inspection
- Lecture2.8 Eavesdropping
- Lecture2.9 Decompiling and Debugging
- Lecture2.10 Open Source Intelligence
- Lecture2.11 Vulnerability Scanning
- Lecture2.12 Scanning Considerations
- Lecture2.13 Application and Container Scans
- Lecture2.14 Analyzing Vulnerability Scans
- Lecture2.15 Leverage Information for Exploit
- Lecture2.16 Common Attack Vectors
- Lecture2.17 Weaknesses in Specialized Systems
Attacks and Exploits
- Lecture3.1 Attacks and Exploits (Overview)
- Lecture3.2 Social Engineering
- Lecture3.3 Motivation Factors
- Lecture3.4 Physical Security Attacks
- Lecture3.5 Lock Picking (Demo)
- Lecture3.6 Network-based Vulnerabilities
- Lecture3.7 Wireless-based Vulnerabilities
- Lecture3.8 Wireless Network Attack (Demo)
- Lecture3.9 Application-based Vulnerabilities
- Lecture3.10 Local Host Vulnerabilities
- Lecture3.11 Privilege Escalation (Linux)
- Lecture3.12 Privilege Escalation (Windows)
- Lecture3.13 Privilege Escalation
- Lecture3.14 Privilege Escalation (Demo)
- Lecture3.15 Lateral Movement
- Lecture3.16 Persistence
- Lecture3.17 Covering Your Tracks
- Lecture3.18 Persistence and Covering Tracks (Demo)
Penetration Testing Tools
- Lecture4.1 Penetration Testing Tools (Overview)
- Lecture4.2 Nmap Usage
- Lecture4.3 Nmap Usage (Demo)
- Lecture4.4 Use Cases for Tools
- Lecture4.5 Scanners
- Lecture4.6 Credential Testing Tools
- Lecture4.7 Password Cracking (Demo)
- Lecture4.8 Debuggers
- Lecture4.9 Software Assurance
- Lecture4.10 OSINT
- Lecture4.11 Wireless
- Lecture4.12 Web Proxies
- Lecture4.13 Social Engineering Tools
- Lecture4.14 Remote Access Tools
- Lecture4.15 Networking Tools
- Lecture4.16 Mobile Tools
- Lecture4.17 Miscellaneous Tools
- Lecture4.18 Intro to Programming
- Lecture4.19 Programming Concepts
- Lecture4.20 BASH Script Example
- Lecture4.21 Python Script Example
- Lecture4.22 PowerShell Script Example
- Lecture4.23 Ruby Script Example
Reporting and Communication
- Lecture5.1 Reporting and Communication (Overview)
- Lecture5.2 Pentest Communications
- Lecture5.3 Report Writing
- Lecture5.4 Mitigation Strategies
- Lecture5.5 Post-Report Activities
- Lecture5.6 Pentest Report Example
Comptia Pentest+live Labs (24/7 with 1 Year Access)
- Lecture6.1 Planning and Scoping Penetration Tests
- Lecture6.2 Conducting Passive Reconnaissance
- Lecture6.3 Performing Non-Technical Tests
- Lecture6.4 Conducting Active Reconnaissance
- Lecture6.5 Analyzing Vulnerabilities
- Lecture6.6 Penetrating Networks
- Lecture6.7 Exploiting Host-Based Vulnerabilities
- Lecture6.8 Testing Applications
- Lecture6.9 Completing Post-Exploit Tasks
- Lecture6.10 Analyzing and Reporting Pen Test Results
Course delivery details
- Virtual Instructor-Led with Remote LAB access 24/7
- On-site
- Classroom Instructor-Led
Expenses
Price: £800.00
Request info
Fortray Global Services
Fortray Global Services LTD experience in delivering IT and Cyber Security Solution & Services | Training Including Job placement programs in every sector of IT | Technical Recruitment | Digital Marketing & SEO and much more. As authorized partners of...