CompTIA PenTest+

  • 40hrs of instructor-led training
  • Blended learning delivery model
  • Certified & Experienced Trainers
  • CompTIA Authorized Training Partner
  • Get certified at an affordable price
Watch Video

Train Your Team: Get Quote

Instructor

Program Highlights

Course Certificate

Certificate Example

You'll receive an official certificate upon successful course completion.

Industry Recognized
CompTIA PenTest+ Course Description Target Audience Exam Information ComTIA PenTest+ Course Objectives ComTIA PenTest+ Course Content Transformation Testimonials FAQ

CompTIA PenTest+ Course Description

Overview

CompTIA PenTest+ is one of the most comprehensive courses that cover all the PenTesting stages. PenTest+ is the only exam that incorporates all aspects of vulnerability management. This course also includes all the latest techniques used against the expanded attack surfaces. 

InfosecTrain has designed a CompTIA PenTest+ PT0-002 course where you will learn to plan and scope a penetration testing engagement, perform pen-testing using correct techniques, tools, and then analyze the outcomes, you will also learn how to understand the compliance and legal requirements, you will also be able to produce a written report containing proposed remediation techniques. 

From the CompTIA PT0-002 course designed by InfosecTrain, you will also learn about Regulatory compliance considerations, location restrictions, rules of engagement, background checks of penetration testing teams, DNS lookups, open-source intelligence, enumeration, fingerprinting, scanning methods, attack methods, injection attacks, report audience, data structures and many more. 

Target Audience

Target Audience

  • IT Security Analyst
  • Penetration and Vulnerability tester
  • Network Security operational
  • Application security vulnerability analyst

Pre-requisites

  • Minimum 3 to 4 years of experience in the field of IT security or related field.
  • Network and security knowledge.

Exam Information

Exam Information

Exam Code PT0-002
Launch date Oct 27, 2021
Number of Questions Maximum of 85 questions
Type of Questions Performance-based and multiple choice
Length of Test 165 minutes
Passing Score 750 (on a scale of 100-900)
Languages English and Japanese

 

ComTIA PenTest+ Course Objectives

CompTIA PenTest+ Course Objectives

  • Knowledge on performing penetration testing and vulnerability scanning.
  • Analysing the results and data and communicate results through effective reporting.
  • Analyse the importance of planning and key aspects of compliance
  • Learn to explore the network, wireless and RF vulnerabilities and physical security attacks and perform post-exploitation techniques.
  • Understand penetration testing through various coding scripts such as Python, Ruby, Bash and PowerShell to gather information from the tool.
  • Understand the pliability of the network to vulnerable attacks and how to mitigate them.
  • Knowledge on overall state of improving the IT security across an organisation

ComTIA PenTest+ Course Content

CompTIA PenTest+ Course Content

1.0 planning and scoping

  • 1.1 Compare and contrast governance, risk, ad compliance concepts
  • 1.2 Explain the importance of scoping organizations/customer requirements
  • 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.

2.0 Information gathering and vulnerability scanning

  • 2.1 Given a scenario, perform passive reconnaissance
  • 2.2 Given a scenario, perform active reconnaissance
  • 2.3 Given a scenario, analyze the results of a reconnaissance exercise
  • 2.4 Given a scenario, perform vulnerability scanning

3.0 Attacks and Exploits

  • 3.1 Given a scenario, research attack vectors and perform network attacks
  • 3.2 Given a scenario, research attack vectors and perform wireless attacks
  • 3.3 Given a scenario, research attack vectors and perform application-based attacks
  • 3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies
  • 3.5 Explain common attacks and vulnerabilities against specialized systems
  • 3.6 Given a scenario, perform a social engineering or physical attack
  • 3.7 Given a scenario, perform post-exploitation techniques

4.0 Reporting and Communication

  • 4.1 Compare and contrast important components of written reports
  • 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report
  • 4.3 Explain the importance of communication during the penetration testing process
  • 4.4 Explain post-report delivery activities

5.0 Tools and Code Analysis

  • 5.1 Explain the basic concepts of scripting and software development
  • 5.2 Given a scenario, analyze a script or code sample for use in a penetration test
  • 5.3 Explain use cases of the following too

Still unsure?

We're just a click away

Can't wait?

Get in touch now

+91 9372188252

Toll Free Number

Career Transformation

Secure Your Future in Cybersecurity

Join the next generation of security professionals with our industry-leading training programs

3.4 million+

Global Cybersecurity Talent Shortage

Unfilled positions projected by 2025 across all industries

$$4.55 Million

Average Data Breach Cost

Financial impact for organizations without proper security

Our Training Impact

65%+

Companies hiring our graduates

Industry Recognition

Our certified professionals are sought after by leading organizations

Investment in Security

Organizations prioritizing cybersecurity training

72%%

Increased training budgets

Industry Demand

Education

High demand for security professionals

Healthcare

High demand for security professionals

Retail

High demand for security professionals

Government

High demand for security professionals

Manufacturing

High demand for security professionals

Finance

High demand for security professionals

Reviews & Testimonials

Shishir Solanki

Shishir Solanki

"CISA training provided by Cybertech's was excellent—well-structured, expert-led, and packed with insights that greatly enhanced my audit and security..."

Prasad Dhuri

Prasad Dhuri

India.

"CyberTech’s CRTP training was outstanding—hands-on labs, expert instruction, and real-world skills that truly elevate your red teaming capabilities."

Sonali Sahare

Sonali Sahare

India

"CHFI training and certification were outstanding—expert guidance, practical labs, and in-depth content made learning digital forensics truly engaging!"

Kiran Sawant

Kiran Sawant

India

"CyberTech’s ISO 27001:2022 training and certification were exceptional—comprehensive content, expert trainers, and real-world insights into informatio..."

Konain Faroqui

Konain Faroqui

India

"CEH training was phenomenal—comprehensive content, skilled instructors, real-world labs, and up-to-date tools made ethical hacking both engaging and c..."

Arpana Jagtap

Arpana Jagtap

India

"CEH training and certification were outstanding—comprehensive curriculum, expert instructors, hands-on labs, and real-world scenarios made learning et..."

Shubham Maheshwari

Shubham Maheshwari

India

"CyberTech’s CPENT training and certification were exceptional—intense, hands-on, and expertly delivered. The real-world scenarios, advanced techniques..."

Priyanka Yadav

Priyanka Yadav

India

"CISSP training and certification were outstanding—comprehensive, well-structured, and led by expert instructors. The practical insights and detailed c..."

Frequently Asked Questions

The exam includes multiple-choice questions (single and multiple response), drag-and-drop activities, and performance-based items
Candidates have 165 minutes to complete the exam, which consists of a maximum of 85 questions.
The exam covers planning and scoping, information gathering, vulnerability identification, attacks and exploits, penetration testing tools, and reporting and communication
The exam emphasizes practical skills and the ability to apply knowledge in real-world scenarios.
The certification is valid for three years from the date of passing the exam.