Login / Register

Shopping cart

CompTIA PenTest+

Last Update:

October 7, 2025

Accredited by:

Course Overview

As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies
related to pen testing, and you will work your way through a simulated pen test for a fictitious company.

This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0‐003.

Job Roles

After completing the training, you will be able to:

  • Penetration Tester
  • Vulnerability Tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability

After completing the training, you will be able to:

  • Penetration Tester
  • Vulnerability Tester
  • Security Analyst (II)
  • Vulnerability Assessment Analyst
  • Network Security Operations
  • Application Security Vulnerability

Prerequisites

To ensure your success in this course, you should have:

  • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
  • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments

You can obtain this level of skills and knowledge by taking the official CompTIA® Security+® (Exam SY0‐501) course or by obtaining the appropriate industry certification.

Course Content Summary

Day 1
9.00 am – 12.30 pm
1.1: Professional Conduct and Penetration Testing
1.2: Collaboration and Communication
1.3: Testing Frameworks and Methodologies
1.4: Introduction to Scripting for Penetration Testing

12.30 pm – 1.30 pm – Lunch

1.30 0m – 5.00 pm
2.1: Define the Scope
2.2: Compare Types of Assessments
2.3: Utilize the Shared Responsibility Model
2.4: Identify Legal and Ethical Considerations

Day 2
9.00 am – 12.30 pm
3.1: Information Gathering Techniques
3.2: Host and Service Discovery Techniques
3.3: Enumeration for Attack Planning
3.4: Enumeration for Specific Assets

12.30 pm – 1.30 pm – Lunch

1.30 0m – 5.00 pm
4.1: Vulnerability Discovery Techniques
4.2: Analyzing Reconnaissance Scanning and Enumeration
4.3: Physical Security Concepts

Day 3
9.00 am – 12.30 pm
5.1: Prepare and Prioritize Attacks
5.2: Scripting Automation

12.30 pm – 1.30 pm – Lunch

1.30 0m – 5.00 pm
6.1: Web‐based Attacks
6.2: Cloud‐Based Attacks

Day 4
9.00 am – 12.30 pm
7.1: Perform Network Attacks
7.2: Perform Authentication Attacks
7.3: Perform Host‐Based Attacks

12.30 pm – 1.30 pm – Lunch

1.30 0m – 5.00 pm
8.1: Wireless Attacks
8.2: Social Engineering Attacks
8.3: Specialized System Attacks

Day 5
9.00 am – 12.30 pm
9.1: Establish and Maintain Persistence
9.2: Move Laterally through Environments
9.3: Staging and Exfiltration
9.4: Cleanup and Restoration

12.30 pm – 1.30 pm – Lunch

1.30 0m – 5.00 pm
10.1: Penetration Test Report Components
10.2: Analyze Findings and Remediation Recommendations
11.1: Prepare for CompTIA PenTest+ Certification
11.2: Practice Exam

Price From:

RM4,500.00

Enquire for More Info

Courses You May Like

CERTIFICATION

CERTIFICATION

CERTIFICATION

CERTIFICATION

Generative AI Essential on AWS

1 Day

Fundamental

RM988.00 RM1,800.00