Course Overview
This intensive PenTest+ certification training equips cybersecurity professionals with offensive security skills to conduct penetration testing and vulnerability assessment engagements. Covering all exam objectives (PT0-002), the course provides hands-on experience with modern attack techniques, tools, and methodologies while emphasizing proper scoping, reporting, and compliance requirements.
Course Objectives
Upon completion, participants will be able to:
✔ Plan and scope penetration testing engagements
✔ Conduct comprehensive reconnaissance activities
✔ Exploit network, application, and wireless vulnerabilities
✔ Analyze and pivot through compromised systems
✔ Document findings and recommend remediation
✔ Prepare for the CompTIA PenTest+ (PT0-002) exam
Who Should Attend
This course is ideal for:
◼ Penetration Testers & Ethical Hackers
◼ Security Consultants & Auditors
◼ Red Team Members
◼ Network Security Engineers
◼ SOC Analysts expanding to offensive roles
◼ IT Professionals seeking penetration testing skills
Course Content Breakdown
Day 1: Planning & Scoping
- Compliance-based assessment frameworks
• Rules of engagement and legal considerations
• Vulnerability scanning vs penetration testing
• Workshop: Creating a professional statement of work
Day 2: Information Gathering & Vulnerability Analysis
- Passive and active reconnaissance techniques
• Nmap advanced scanning methodologies
• Vulnerability validation and prioritization
• Lab: Building a target attack surface profile
Day 3: Network & Application Attacks
- Exploiting network services and protocols
• Web application penetration testing (OWASP Top 10)
• Privilege escalation techniques
• Practical: AD environment exploitation
Day 4: Wireless & Cloud-Based Attacks
- Wireless security assessments (WPA3, RFID)
• Cloud penetration testing methodologies
• Container security evaluation
• Hands-on: Exploiting misconfigured cloud assets
Day 5: Reporting & Capstone Challenge
- Developing actionable technical reports
• Executive summary creation for stakeholders
• Full-scope penetration test simulation
• Exam preparation and question review