Professional Training

CompTIA PenTest+ (Exam PT0-001) Online Training Course

Learning247, Online
Price
59 GBP excl. VAT
Next course start
Start anytime See details
Course delivery
Self-Paced Online
Price
59 GBP excl. VAT
Next course start
Start anytime See details
Course delivery
Self-Paced Online
Leave your details so the provider can get in touch

Course description

CompTIA PenTest+ (Exam PT0-001) Online Training Course

This highly hands-on course gives participants experience in network and syst penetration testing. It covers all of the exam objectives for the PT0-001 exam, while taking the learner step-by-step through hacking and exploiting each network and syst type. Tools used in the activities are mostly Kali Linuxbased, covering a broad range of real-world examples used by penetration testers and red teams.

The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.

Upcoming start dates

1 start date available

Start anytime

  • Self-Paced Online
  • Online
  • English

Outcome / Qualification etc.

Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.

Training Course Content

The topics in this course follow a natural real-world pentest engagent flow, as well as map to the exam objectives.

Module 1 - The Pen Test EngagentIn this module, you will learn how to work with a client and prepare for a penetration testing engagent. The topics are:

1. Penetration Testing OverviewIn this topic, you will learn what a penetration test is, the steps taken to prepare for a pentest, tools used, communicating with the client and your team, and pen testing standards and frameworks.

2. Engagent Planning In this topic, you will learn about the logistics of planning for a pentest engagent including setting scope, determining end goals and deliverables, assessment types, threat modeling, and scheduling.

3. Engagent DocumentsIn this topic, you will learn about documentation required for a professional pentest engagent including contracts, authorizations, rules of engagent, impact analysis, disclaimers, and support resources.

4. Prepare to Go Live In this topic, you will prepare both the client and your team to start the actual test.

Module 2 - Passive ReconnaissanceIn this module, you will learn how to gather background information on your target. The topic is:

1. OSINT In this topic, you will learn about passive reconnaissance through open source intelligence gathering, including using websites, social media, Google hacking, DNS querying, and other tools.

Activities include using Whois, Google Hacking Database, theHarvester, Recon-ng, FOCA, dig, nslookup, and Shodan.

Module 3 - Active ReconnaissanceIn this module, you will learn how to actively search for targets. The topics are:

1. Host Discovery and Port Scanning In this topic, you will learn about the different tools and methods for discovering target systs and the services they provide.Activities include using the command line, nmap, and Metasploit.

2. EnumerationIn this topic, you will learn how to obtain additional information from network services, Windows and Linux systs, as you prepare to exploit those systs.

Activities include using Windows and Linux command line commands, nmap, netcat, telnet, rpcclient, dirbuster, and Metasploit.

3. Vulnerability ScanningIn this topic, you will use different types of scans including packet crafting to discover exploitable vulnerabilities on hosts, websites, network services, and network devices.

Activities include using OpenVAS, nmap NSE scripts, Metasploit Pro, sqlmap, Nikto, MBSA, hping3, airmon-ng, aircrack-ng, Fern Wi-Fi Cracker, mdk3, and Kismet.

Module 4 - Physical SecurityIn this module, you will learn how to test physical security controls. The topic is:

1. Physical Security TestsIn this topic, you will learn about ways to circumvent physical security controls to gain access to restricted areas.

Activities include RFID badge cloning

Module 5 - Social EngineeringIn this topic, you will learn about social engineering. The topic is:

1. Social Engineering AttacksIn this topic, you will learn how to execute both technical and non-technical social engineering attacks.

Activities include using msfvenom and Metasploit for USB stick baiting, and the Kali Social Engineering Toolkit for website login cloning, phishing, and credential interception.

Module 6 - Vulnerability Scan AnalysisIn this module, you will learn how to examine vulnerability scan results to choose the best exploit against discovered targets. The topic is:

1. Vulnerability Scan ResultsIn this topic, you will learn how to assess vulnerability scan results, weed out FALSE positives, adjudicate and prioritize findings, and map vulnerabilities to exploits. You will also learn about both the value and limits of using automated vulnerability scans in your pentest engagent.

Activities include using Metasploit Pro to validate vulnerability scan findings and determine the appropriate exploit modules that can be used to penetrate the vulnerable systs.

Module 7 - Password CrackingIn this module, you will learn the basics of password cracking. The topic is:

1. Password Cracking TypesIn this topic, you will learn about dictionary, rainbow table, and brute force attacks. You will learn how to brute force network service authentication, intercept a network authentication, and pass-the-hash.

Activities include using Medusa, John-the-Ripper, Wireshark, and Metasploit.

NOTE: You will learn additional password cracking techniques in subsequent modules.

Module 8 - Penetrating Wired NetworksIn this module, you will learn how to penetrate a wired Ethernet network. The topic is:

1. Common Network ExploitsIn this topic, you will learn how to sniff wired network activity, intercept file transfers, read transmitted ail, conduct Man-in-the-Middle attacks using ARP poisoning, hijack TCP sessions, execute network-based denial-of-service attacks, and exploit common network services.

Activities include using Wireshark, ettercap, Low Orbit Ion Cannon, nmap, the Searchsploit database, gcc, and Metasploit.

Module 9 - Penetrating Wireless NetworksIn this module, you will learn how attack wireless networks. The topic is:

1. Wireless Network ExploitsIn this topic you will learn how to sniff and jam Wi-Fi networks, crack WEP, WPA/WPA2 and WPS, conduct Evil Twin attacks, and attack BlueTooth.

Activities include using Netcut, Wireshark, and airmon-ng, besside-ng, bettercap, and Wi-Fi Pumpkin.

Module 10 - Windows ExploitsIn this module, you will learn how to exploit Windows hosts. The topics are:

1. Common Windows-Based VulnerabilitiesIn this topic you will learn about common Windows vulnerabilities, exploits, and payloads.

Activities include using Metasploit, the Searchsploit database, and command-line commands.

2. Password Cracking in WindowsIn this topic, you will learn about cracking Windows passwords.

Activities include using Cain & Abel, John-the-Ripper and L0pht 7

3. Windows ComponentsIn this topic, you will learn how to exploit standard Windows components including default protocols and configurations, the file syst, the kernel, and mory. You will also learn how to leverage these components to escalate privilege on a compromised host.

Activities include using Metasploit and the Searchsploit database.

4. Windows AccountsIn this topic you will learn how to exploit default and user-defined Windows accounts.

Activities include using Metasploit and command-line commands.

5. SandboxesIn this topic, you will learn about using sandboxing to contain hacking attpts.

Module 11 - Linux ExploitsIn this module, you will learn how to hack Linux systs. The topics are:

1. Common Linux/Unix-Based VulnerabilitiesIn this topic you will learn about common Linux vulnerabilities, exploits, and payloads.

Activities include using Metasploit, the Searchsploit database, and command-line commands.

2. Password Cracking in LinuxIn this topic you will learn how to crack Linux passwords.

Activities include using command-line commands, unshadow, and John-the-Ripper.

3. Vulnerable Linux ComponentsIn this topic, you will learn how to exploit standard Linux components including default protocols and configurations, the file syst, the kernel, and mory. You will also learn how to leverage these components to escalate privilege on a compromised host.

Activities include using command-line commands, Metasploit and the Searchsploit database.

4. Linux AccountsIn this topic, you will learn how to attack default Linux accounts.

Activities include using Linux bash commands.

Module 12 - Mobile DevicesIn this module, you will learn how to attack mobile devices. The topics are:

1. Android ExploitsIn this topic, you will learn how to exploit common Android vulnerabilities

Activities include using msfvenom and Metasploit to compromise and rotely control an Android phone.

2. Apple ExploitsIn this topic, you will learn how to exploit common Apple vulnerabilities

Activities include using nmap and WinSCP to access a compromised iPhone.

Module 13 - Specialized SystsIn this module, you will learn about specialized systs. The topics are:

1. ICSIn this topic, you will learn about common vulnerabilities of industrial control ICS and SCADA systs

2. bedded SystsIn this topic, you will learn about common vulnerabilities of bedded systs such as point-of-sale and real-time operating systs

Activities include using a Raspberry PI to attack an internal network.

3. 13.3 IoTIn this topic, you will learn about common and erging threats related to the Internet of Things

4. 13.4 Hardware AttacksIn this topic, you will learn about additional hardware-based attacks that can be conducted against specialized systs.

Module 14 - ScriptsIn this module, you will learn the basics of scripting, as pertains to penetration testing. The topics are:

1. Scripting BasicsIn this topic, you will learn about the basics of Bash, PowerShell, Python, and Ruby scripting

2. Common Scripting ElentsIn this topic, you will learn about common scripting elents found in all of the scripting languages including variables, substitution, arrays, operations, logic, and error handling.

Activities include writing simple scripts.

Module 15 - Application TestingIn this module you will learn about testing application code for vulnerabilities. The topics are:

1. Static Code AnalysisIn this topic, you will learn how to analyze static, non-running code

2. Dynamic Code AnalysisIn this topic, you will learn how to test running code.

Activity includes fuzz testing an application for potential buffer overflow vulnerabilities.

3. Reverse EngineeringIn this topic, you will learn about application reverse-engineering techniques including de-compilation, disassbly, and debugging.

Module 16 - Web App ExploitsIn this module, you will learn how to exploit web apps. The topics are:

1. Common Web Application VulnerabilitiesIn this topic, you will learn how to exploit authentication, authorization, misconfigurations, browser sessions, and insecure code.

2. Injection AttacksIn this topic, you will learn about various injection techniques.

Activities include using a browser, sqlmap, and Metasploit to inject code and SQL commands into a web app form.

3. Cross-Site AttacksIn this topic, you will learn how to conduct Cross-Site Scripting and Cross-Site Request Forgery attacks.

Activities include using a browser and other tools to perform XSS attacks.

4. Other Web-Based AttacksIn this topic, you will learn how to conduct other types of web-based attacks including clickjacking, file inclusion, and webshells.

Module 17 - Lateral MoventIn this module, you will learn how to move around in a compromised network. The topic is:

1. Lateral Movent TechniquesIn this topic, you will learn how to use lateral movent techniques including migrating malicious code to another process, pivoting, and using proxy chains.

Activities include using Metasploit to migrate code and pivot through the target network, and Armitage Team Server to pass control to another attacker.

Module 18 - PersistenceIn this module, you will learn how to maintain control of a compromised syst. The topics are:

1. Persistence TechniquesIn this topic, you will learn about common persistence techniques.

2. BackdoorsIn this topic, you will learn how to plant persistent back doors on a compromised syst.

Activities include using ProRAT Trojan builder

3. Bind and Reverse ShellsIn this topic, you will learn the difference between bind and reverse shells, and when it is appropriate to use either.

Activities include using Metasploit to create bind and reverse connections to a compromised target.

4. NetcatIn this topic, you will learn how to use netcat to set up a persistent back door.

Activities include using netcat to launch both bind and reverse shells.

5. Scheduled TasksIn this topic, you will learn how to maintain persistence through scheduled tasks.

Activities include using the task scheduler to regularly launch a netcat session that exfiltrates updated data out of the target and back to the attacker.

Module 19 - Cover Your TracksIn this module, you will learn how to rove evidence of your hacking activities. The topic is:

1. Anti-forensics TechniquesIn this topic, you will learn how to hide malicious activity from a forensic investigator

Activities include clearing logs, changing file timestamps, and impersonating another user when conducting malicious activity.

Module 20 - The ReportIn this module, you will learn how to analyze your pentest findings and write a report as the final deliverable for your client. The topics are:

1. Data AnalysisIn this topic, you will categorize and prioritize the data you have collected during the penetration test.

2. RecommendationsIn this topic, you will formulate recommendations for the client based on the data you collected during the penetration test.

3. Writing the ReportIn this topic, you will normalize the data you have collected, and organize it into an actionable report aimed at multiple audiences.

4. Handling the ReportIn this topic, you will securely hand over the report to your client.

The activity includes examining real world report examples.

Module 21 - Post Engagent CleanupIn this module, you will learn about the tasks you must perform after completing a professional penetration test. The topic is:

1. Post Engagent ActivitiesIn this topic, you will learn about the cleanup tasks required after a typical pentest engagent, including roving artifacts, client acceptance of the findings, lessons learned, and follow up actions.

Why choose Learning247

Gain a New Qualification - Get a verifiable qualification with Learning247 and improve your career prospects. Most of our courses CPD Accredited.

Wide Range of Courses - With over 800+ courses to choose from you're sure to find a course that interests you.

Study Anywhere & Any time - All of our online courses can be studied from your PC, MacBook , tablet or smart phone device.

Request info

Contact course provider

Fill out your details to find out more about CompTIA PenTest+ (Exam PT0-001) Online Training Course.

  Contact the provider

  Get more information

  Register your interest


reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Learning247
61 Caroline Street
B3 1UF Birmingham

Learning247 

As one of the market-leaders in distance-learning and self-study multimedia-based training, Learning247 provides the most cost-effective route to enable you to update and improve upon your skills; and all without the massive prices that are regularly seen throughout the training...

Read more and show all courses with this provider

Ads