CompTIA PenTest+ | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CompTIA PenTest+

Location

Format What’s this?
Starting From
RM 3500.00
  1. 5 Days
  1. HRDF SBL Claimable
  2. Lunch & refreshment provided
  3. Certificate of Attendance available
  1. 5 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.

CompTIA PenTest+

WHAT YOU WILL LEARN

Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.

This course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.

AUDIENCE

This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course.

This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.


PREREQUISITES

To ensure your success in this course, you should have:

• Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.

• Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

You can obtain this level of skills and knowledge by taking the CompTIA® Security+® (Exam SY0-501) course or by obtaining the appropriate industry certification.


METHODOLOGY

This program will be conducted with interactive lectures, PowerPoint presentation, discussion and practical exercise.

COURSE OBJECTIVES

After you complete this course, you will be able to plan, conduct, analyze, and report on penetration tests.

You will:

• Plan and scope penetration tests.

• Conduct passive reconnaissance.

• Perform non-technical tests to gather information.

• Conduct active reconnaissance.

• Analyze vulnerabilities.

• Penetrate networks.

• Exploit host-based vulnerabilities.

• Test applications.

• Complete post-exploit tasks.

• Analyze and report pen test results.


Expand All

Modules

Module 1: Planning and Scoping Penetration Tests

• Introduction to Penetration Testing Concepts

• Plan a Pen Test Engagement
• Scope and Negotiate a Pen Test Engagement
• Prepare for a Pen Test Engagement

Module 2: Conducting Passive Reconnaissance

• Gather Background Information

• Prepare Background Findings for Next Steps


Module 3: Performing Non-Technical Tests

• Perform Social Engineering Tests

• Perform Physical Security Tests on Facilities


Module 4: Conducting Active Reconnaissance

• Scan Networks

• Enumerate Targets

• Scan for Vulnerabilities

• Analyze Basic Scripts


Module 5: Analyzing Vulnerabilities

• Analyze Vulnerability Scan Results

• Leverage Information to Prepare for Exploitation


Module 6: Penetrating Networks

• Exploit Network-Based Vulnerabilities

• Exploit Wireless and RF-Based Vulnerabilities

• Exploit Specialized Systems


Module 7: Exploiting Host-Based Vulnerabilities

• Exploit Windows-Based Vulnerabilities

• Exploit *nix-Based Vulnerabilities


Module 8: Testing Applications

• Exploit Web Application Vulnerabilities

• Test Source Code and Compiled Apps


Module 9: Completing Post-Exploit Tasks

• Use Lateral Movement Techniques

• Use Persistence Techniques

• Use Anti-Forensics Techniques


Module 10: Analyzing and Reporting Pen Test Results

• Analyze Pen Test Data

• Develop Recommendations for Mitigation Strategies

• Write and Handle Reports

• Conduct Post-Report-Delivery Activities


Balasubramaniam @ Balan Ramanaidoo

Balasubramaniam @ Balan Ramanaidoo

Balasubramaniam@Balan is a certified Trainer with specialization in the field of Information Systems, Network Security and a Master's Holder in Business Administration. Being exposed to information systems and network operations-based environment, he has garnered interest in that respective field. Ever since then he has continuously updated himself with various kind of knowledge either from the area of training or having managed medium range project locally or abroad. One of the mainstream projects that was partially outsourced, in the area of complete network infrastructure implementation, configuration was handled and completed in due time which also contributed to his additional knowledge on different area of skills which could have not been obtained via certification He has served corporate giants such as LYODD Register, Kuala Lumpur City Center Berhad (KLCCB), Putrajaya Holdings (PJH), University Technology PETRONAS (UTP), Maxis Communication Berhad, Asia Pacific Broadcasting Union (ABU), United Nations Development Programme (UNDP), USAG & Kuala Lumpur Heart Care (KLHC). He is currently associated with I Tech Train & Xtenza Solutions Pvt Ltd (USA) as a Project Consultant. He has been a project manager and technical trainer since year 2007 and has educated many corporate professionals from various industries ever since then. Balan has wide knowledge and experience in Microsoft, Linux, Cisco, Security, Network Security Auditing, Datacentre Management, Design & Build and Project Management, including preparation of Project planning manual and procedures according to international standards. Apart from this he also conducts part time lectures in both public and private universities on IT related and Management subjects. Balan's extensive tutelage experiences, range from training corporate executives for Microsoft Certification, Cisco, IPv6, Networking, Information Systems Security, Network Auditing and project deployment for large MNCs. Read More

K L Ramasankara Rao

K L Ramasankara Rao

A highly competent and experienced systems and security implementation specialist and instructor with experience of system and security administration. Possessing a proven ability to impart the necessary knowledge and skills to IT professionals necessary for them to manage the day-to-day running of an IT department and its business IT systems. Extensive knowledge of monitoring and controlling data security within guidelines to ensure compliance and report on possible improvements. Well mannered, articulate and able to act as point of contact for colleagues and external clients. As a CCIE in Data Center, managing of data center networks are through software defined networks (SD-WAN) and through Implementing Cisco Network Programmability. Read More

Course Reviews

No Remarks

0

0 Ratings