0 Items Total: $0
CompTIA PenTest+
PenTest
PenTest

Why is it different?
PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them.

PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.

CompTIA PenTest+

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings.
Candidates will also have the best practices to communicate recommended strategies to improve the overall state of IT security.

PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

CompTIA PenTest+

Jobs that use PenTest+:

  • Penetration Tester
  • Vulnerability Tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability
CompTIA PenTest+

Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow Security+ or equivalent experience and has a technical, hands-on focus.

CompTIA PenTest+

Pass the PenTest+ Exam

Course structure

PLANNING & SCOPING

Explain the importance of planning and key aspects of compliance-based assessments

INFORMATION GATHERING & VULNERABILITY IDENTIFICATION

Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.

ATTACKS & EXPLOITS

Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks, and perform post-exploitation techniques

PENETRATION TESTING TOOLS

Conduct information gathering exercises with various tools and analyze output and basic scripts (limited to: Bash, Python, Ruby, PowerShell)

REPORTING & COMMUNICATION

Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities

Want to run this in-house?
Schedule

There are no scheduled dates for this course. Fill out the form to check future dates or deliver the course in-house

Trainers
Frequently asked questions

Enquire now