CompTIA PenTest+
CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.
CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.
CompTIA PenTest+ joins CompTIA Cybersecurity Analyst (CySA+) at the intermediate-skills level of the cybersecurity career pathway. Depending on your course of study, PenTest+ and CySA+ can be taken in any order but typically follows the skills learned in Security+. While CySA+ focuses on defense through incident detection and response, PenTest+ focuses on offense through penetration testing and vulnerability assessment.
Although the two exams teach opposing skills, they are dependent on one another. The most qualified cybersecurity professionals have both offensive and defensive skills. Earn the PenTest+ certification to grow your career within the CompTIA recommended cybersecurity career pathway.
CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them.
PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
CompTIA PenTest+ meets the ISO 17024 standard. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
Organizations that have contributed to the development of PenTest+
Penetration Tester
Vulnerability Tester
Security Analyst (II)
Vulnerability Assessment Analyst
Network Security Operations
Application Security Vulnerability
Welcome To The CompTIA PenTest+
About The CompTIA PentTest+
Planning And Scoping
Penetration Testing Methodology
Planning a Penetration Test
Rules Of Engagement
Legal Concepts
Testing Strategies
White Box Support Resources
Types of Assessments
Threat Actors
Target Selection
Other Scoping Considerations
Information Gathering and Vulnerability Identification (Overview)
Information Gathering
Reconnaissance With CentralOps (Demo)
Scanning And Enumeration
Fingerprinting
Scanning and Enumeration (Demo)
Cryptographic Inspection
Eavesdropping
Eavesdropping
Decompiling and Debugging
Open Source Research
Vulnerability Scanning
Scanning Considerations
Application And Container Scans
Analyzing Vulnerability Scans
Leverage Information for Exploit
Common Attack Vectors
Weaknesses In Specialized Systems
Attacks And Exploits (Overview)
Social Engineering
Motivation Factors
Physical Security Attacks
Lock Picking (Demo)
Network-based Vulnerabilities
Wireless-based Vulnerabilities
Wireless Network Attack (Demo)
Application-Based Vulnerabilities
Local Host Vulnerabilities
Privilege Escalation (Windows)
Privilege Escalation
Privilege Escalation (Demo)
Lateral Movement
Persistence
Covering Your Tracks
Covering Your Tracks
Penetration Testing Tools (Overview)
Nmap Usage
Nmap Usage (Demo)
Use Cases for Tools
Scanners
Credential Testing Tools
Password Cracking (Demo)
Debuggers
Software Assurance
OSINT
Wireless
Web Proxies
Social Engineering Tools
6Remote Access Tools
Networking Tools
Mobile Tools
Miscellaneous Tools
Intro to Programming
Programming Concepts
Programming Concepts
BASH Script Example
Python Script Example
PowerShell Script Example
71.Ruby Script Example
Reporting and Communication (Overview)
Pentest Communications
Report Writing
Mitigation Strategies
Post-Report Activities
Pentest Report Example
Regular price