TDI

CompTIA Pentest+

Duration

5 Days

Start Date

9-Feb-2026

End Date

13-Feb-2026

Venue

CAIRO – EGYPT

price

1475 KD

20% discount for group above 5 attendees

Course Overview

This intensive PenTest+ certification training equips cybersecurity professionals with offensive security skills to conduct penetration testing and vulnerability assessment engagements. Covering all exam objectives (PT0-002), the course provides hands-on experience with modern attack techniques, tools, and methodologies while emphasizing proper scoping, reporting, and compliance requirements.

Course Objectives

Upon completion, participants will be able to:
✔ Plan and scope penetration testing engagements
✔ Conduct comprehensive reconnaissance activities
✔ Exploit network, application, and wireless vulnerabilities
✔ Analyze and pivot through compromised systems
✔ Document findings and recommend remediation
✔ Prepare for the CompTIA PenTest+ (PT0-002) exam

Who Should Attend

This course is ideal for:
◼ Penetration Testers & Ethical Hackers
◼ Security Consultants & Auditors
◼ Red Team Members
◼ Network Security Engineers
◼ SOC Analysts expanding to offensive roles
◼ IT Professionals seeking penetration testing skills

Course Content Breakdown

Day 1: Planning & Scoping

  • Compliance-based assessment frameworks
    • Rules of engagement and legal considerations
    • Vulnerability scanning vs penetration testing
    • Workshop: Creating a professional statement of work

Day 2: Information Gathering & Vulnerability Analysis

  • Passive and active reconnaissance techniques
    • Nmap advanced scanning methodologies
    • Vulnerability validation and prioritization
    • Lab: Building a target attack surface profile

Day 3: Network & Application Attacks

  • Exploiting network services and protocols
    • Web application penetration testing (OWASP Top 10)
    • Privilege escalation techniques
    • Practical: AD environment exploitation

Day 4: Wireless & Cloud-Based Attacks

  • Wireless security assessments (WPA3, RFID)
    • Cloud penetration testing methodologies
    • Container security evaluation
    • Hands-on: Exploiting misconfigured cloud assets

Day 5: Reporting & Capstone Challenge

  • Developing actionable technical reports
    • Executive summary creation for stakeholders
    • Full-scope penetration test simulation
    • Exam preparation and question review