CompTIA PenTest PT0-001

50 Hours / Access Length: 12 Months / Delivery: Online, Self-Paced

Course Overview:

The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares a student to take the CompTIA PenTest PT0-001 certification exam.

Course Outline:

Lesson 1: Introduction
Lesson 2: Introduction to Ethical Hacking and Penetration Testing
  • Understanding Ethical Hacking and Penetration Testing
  • Understanding the Current Threat Landscape
  • Exploring Penetration Testing Methodologies
  • Building Your Own Lab
  • Review All Key Topics
Lesson 3: Planning and Scoping a Penetration Testing Assessment
  • Explaining the Importance of the Planning and Preparation Phase
  • Understanding the Legal Concepts of Penetration Testing
  • Learning How to Scope a Penetration Testing Engagement Properly
  • Learning the Key Aspects of Compliance-Based Assessments
  • Review All Key Topics
Lesson 4: Information Gathering and Vulnerability Identification
  • Understanding Information Gathering and Reconnaissance
  • Understanding the Art of Performing Vulnerability Scans
  • Understanding How to Analyze Vulnerability Scan Results
  • Review All Key Topics
Lesson 5: Social Engineering Attacks
  • Understanding Social Engineering Attacks
  • Phishing
  • Pharming
  • Malvertising
  • Spear Phishing
  • SMS Phishing
  • Voice Phishing
  • Whaling
  • Elicitation, Interrogation, and Impersonation (Pretexting)
  • Social Engineering Motivation Techniques
  • Shoulder Surfing
  • USB Key Drop and Social Engineering
  • Review All Key Topics
Lesson 6: Exploiting Wired and Wireless Networks
  • Exploiting Network-Based Vulnerabilities
  • Exploiting Wireless and RF-Based Attacks and Vulnerabilities
  • Review All Key Topics
Lesson 7: Exploiting Application-Based Vulnerabilities
  • Overview of Web Applications for Security Professionals
  • How to Build Your Own Web Application Lab
  • Understanding Injection-Based Vulnerabilities
  • Exploiting Authentication-Based Vulnerabilities
  • Exploiting Authorization-Based Vulnerabilities
  • Understanding Cross-Site Scripting (XSS) Vulnerabilities
  • Understanding Cross-Site Request Forgery Attacks
  • Understanding Clickjacking
  • Exploiting Security Misconfigurations
  • Exploiting File Inclusion Vulnerabilities
  • Exploiting Insecure Code Practices
  • Review All Key Topics
Lesson 8: Exploiting Local Host and Physical Security Vulnerabilities
  • Exploiting Local Host Vulnerabilities
  • Understanding Physical Security Attacks
  • Review All Key Topics
Lesson 9: Performing Post-Exploitation Techniques
  • Maintaining Persistence After Compromising a System
  • Understanding How to Perform Lateral Movement
  • Understanding How to Cover Your Tracks and Clean Up Systems After a Penetration Testing Engagement
  • Review All Key Topics
Lesson 10: Penetration Testing Tools
  • Understanding the Different Use Cases of Penetration Testing Tools and How to Analyze Their Output
  • Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements
  • Review All Key Topics
Lesson 11: Understanding How to Finalize a Penetration Test
  • Explaining Post-Engagement Activities
  • Surveying Report Writing Best Practices
  • Understanding Report Handling and Communications Best Practices
  • Review All Key Topics

Certification(s):

This course prepares a student to take the CompTIA PenTest PT0-001 certification exam.


System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.
Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.


** Outlines are subject to change, as courses and materials are updated. Software is not included with the purchase of the course, unless otherwise specified. Students are responsible for the purchase and installation of the necessary course software. **