Enroll TODAY!

PenTest+

Price
$2,295.00 USD

Duration
5 Days | Mon – Fri, Daytime
10 Days | Sun – Thur, Evenings

 

Enroll and receive an Exam Voucher discount for this program.

Delivery Methods
Virtual Instructor Led
Private Group

Excellence

At DSDT, we recognize that every professional arriving at our program possesses unique aspirations that demand nothing less than excellent training. Our Career Skills+™ program is designed to not only meet but exceed your educational expectations, ensuring a robust path to career advancement.

Empowerment

Gain practical empowerment with hands-on training in the latest industry best practices, guided by seasoned experts. Our courses are structured to integrate seamlessly into your existing professional schedule, providing flexible yet comprehensive learning experiences.

Certification

Upon the successful completion of your coursework and real-world projects, DSDT will award you with a professional certificate, affirming your new skills and preparing you for further professional achievements.

Support

We provide round-the-clock support to all our participants, ensuring that every question is answered and every opportunity for excellence is seized. Our team is dedicated to your success in the program and beyond, helping you achieve outstanding results in your certification exams.

PenTest+

Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.

This course will also prepare you for the CompTIA PenTest+ certification exam PT0-002.

 
Course Objectives

On course completion, participants will be able to:

Plan and scope penetration tests.
Conduct passive reconnaissance.
Perform non-technical tests to gather information.
Conductive active reconnaissance.
Analyze vulnerabilities.
Penetrate networks.
Exploit host-based vulnerabilities.
Test applications.
Complete post-exploit tasks.
Analyze and report pen test results.

Who Should Attend?

This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.

 
Course Prerequisites

There are no prerequisites for this course.

Enterprise and individual training is available for this program. 

Key Features

Intensive Bootcamp

Our 5 or 10 day bootcamp offers rigorous, instructor-led training that can be attended online via Microsoft Teams or in person in various cities. These sessions are designed to fit seamlessly into your professional life, ensuring you receive comprehensive preparation without compromising your daily responsibilities.

Certification Preparedness

Complete this 5 or 10 day intensive program in preparation to test to earn the CompTIA PenTest+ certification. Participant will also receive a completion certificate, affirming your enhanced skills and knowledgeable experience.

Interactive Classroom Engagement

Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.

Flexible Learning Options

This 5 or 10 day program is available both in-person and via live online formats, offering flexible scheduling options to accommodate your busy calendar. Whether it's during the weekday or the weekend, we make it easy for you to engage and learn.

Expert Instructors

DSDT prides itself on partnering with certified subject matter experts who not only bring over 10 years of real-world experience to the table but also create dynamic, interactive learning environments. Our instructors are dedicated to your success and professional growth.

Continued Learning Resources:

Upon completion of the course, students gain access to extensive post-class materials. This support system is designed to help learners review concepts, catch up on missed sessions, or refine their skills, ensuring continuous professional development and mastery of new competencies.

Exclusive Corporate Training

DSDT offers bespoke group training sessions tailored to the specific needs of your organization. Conducted by our top-tier instructors, these private courses are aimed at fostering collective advancement and skill enhancement within your team, leveraging our strong connections to local industries and cutting-edge digital technology practices.

Guaranteed Course Availability

All scheduled sessions of our program are guaranteed to run as planned, whether in a classroom, live virtual, or in-house setting. We ensure that you can rely on us for your educational needs without disruption.

Customized Training Solutions

Reflecting DSDT’s commitment to addressing specific industry demands, our subject matter experts develop customized training programs that focus on the particular objectives of your team. This approach not only enhances targeted skill development but also integrates practical, real-world applications essential for success in today’s digital landscape.

Agenda

1 – Scoping Organizational/Customer Requirements
Define Organizational PenTesting
Acknowledge Compliance Requirements
Compare Standards and Methodologies
Describe Ways to Maintain Professionalism
2 – Defining the Rules of Engagement
Assess Environmental Considerations
Outline the Rules of Engagement
Prepare Legal Documents
3 – Footprinting and Gathering Intelligence
Discover the Target
Gather Essential Data
Compile Website Information
Discover Open-Source Intelligence Tool
4 – Evaluating Human and Physical Vulnerabilities
Exploit the Human Psyche
Summarize Physical Attacks
Use Tools to Launch a Social Engineering Attack
5 – Preparing the Vulnerability Scan
Plan the Vulnerability Scan
Detect Defenses
Utilize Scanning Tools
6 – Scanning Logical Vulnerabilities
Scan Identified Targets
Evaluate Network Traffic
Uncover Wireless Assets
7 – Analyzing Scanning Results
Discover Nmap and NSE
Enumerate Network Hosts
Analyze Output from Scans
8 – Avoiding Detection and Covering Tracks
Evade Detection
Use Steganography to Hide and Conceal
Establish a Covert Channel
9 – Exploiting the LAN and Cloud
Enumerating Hosts
Attack LAN Protocols
Compare Exploit Tools
Discover Cloud Vulnerabilities
Explore Cloud-Based Attacks
10 – Testing Wireless Networks
Discover Wireless Attacks
Explore Wireless Tools
11 – Targeting Mobile Devices
Recognize Mobile Device Vulnerabilities
Launch Attacks on Mobile Devices
Outline Assessment Tools for Mobile Devices
12 – Attacking Specialized Systems
Identify Attacks on the IoT
Recognize Other Vulnerable Systems
Explain Virtual Machine Vulnerabilities
13 – Web Application-Based Attacks
Recognize Web Vulnerabilities
Launch Session Attacks
Plan Injection Attacks
Identify Tools
14 – Performing System Hacking
System Hacking
Use Remote Access Tools
Analyze Exploit Code
15 – Scripting and Software Development
Analyzing Scripts and Code Samples
Create Logic Constructs
Automate Penetration Testing
16 – Leveraging the Attack: Pivot and Penetrate
Test Credentials
Move Throughout the System
Maintain Persistence
17 – Communicating During the PenTesting Process
Define the Communication Path
Communication Triggers
Use Built-In Tools for Reporting
18 – Summarizing Report Components
Identify Report Audience
List Report Contents
Define Best Practices for Reports
19 – Recommending Remediationc
Employ Technical Controls
Administrative and Operational Controls
Physical Controls
20 – Performing Post-Report Delivery Activities
Post-Engagement Cleanup
Follow-Up Actions

Should you have any questions, we have made it super convenient for you to contact us.

Click this number to call us:

 

888-688-4234

This page is Amazing