Complete Package CompTIA PenTest+ (Exam: PT0-002) incl. examvoucher
duration: 52 hours |
Language: English (US) |
access duration: 180 days |
Incompany available
Details
Would you like to obtain the CompTIA PenTest+ (Exam: PT0-002) certification? Then this total package is perfect for you!
This complete package includes the following:
- E-learning
- LiveLab
- Practice Exam
- Exam voucher
E-learning
Penetration tests are coordinated and simulated cyber attacks used to evaluate the security of a computer system or computer network. This complete package will help you prepare for the CompTIA PenTest+ (PT0-002) certification exam. This E-learning covers at least the following topics:
- The basics of penetration testing, including a comparison of governance, risk and compliance concepts.
- Developing an ethical hacking mindset.
- Gathering information using various passive exploration techniques, such as DNS lookups, cryptographic flaws and social media scraping.
- Using active exploration techniques, such as counting and website exploration, which are commonly used to gather information about hosts, services and websites.
- The vulnerability scanner, how to configure it, the different scanning methods and scanning themes.
- Network attacks and how to investigate and counter them.
- Different attack methods such as eavesdropping, data modification, data corruption, relay attacks, spoofing, jamming, on-path and capture handshakes.
- Social engineering. What is it and how can you recognize it?
- Post-exploitation techniques and tools.
- Preparation of a final written report by a penetration tester or test team that documents all findings and recommendations for a client.
LiveLab
This complete package includes a LiveLab. In a LiveLab, you will perform assignments focused on real-world hardware and/or software. A LiveLab is the ideal opportunity to gain hands-on experience. Because these LiveLabs are completely hosted by us in the cloud, you only need a browser to perform them. The lab environments consist of complete networks with for example clients, servers, routers etc. This is the ultimate way to gain extensive hands-on experience.
Practice Exam
This complete package also includes a practice exam. With that practice exam you will be testing if you are ready to pass the CompTIA PenTest+ Exam: PT0-002. The practice exams are designed to be close to the real exams in both format and content.
Exam Voucher
After completing this E-learning, the LiveLab and the practice exam, you are optimally prepared to take the official exam. This total package includes an exam voucher that you can use to request and take the official CompTIA PenTest+ Exam: PT0-002 . You request the exam voucher via our support department. You should request the voucher during the course duration.
Result
Upon successful completion, you will be familiar with the concepts and methodologies related to penetration testing.
After completing this course, you are ready for the CompTIA PenTest+ (PT0-002) certification exam.
Prerequisites
You have knowledge about CompTIA Network+, CompTIA Security+, or something similar
3-4 years of hands-on experience in information security related experience is recommended.
Target audience
Security Specialist
Content
Complete Package CompTIA PenTest+ (Exam: PT0-002) incl. examvoucher
CompTIA PenTest+ (PT0-002): Scoping & Engagement
Penetration testing is a coordinated and simulated cyberattack
- used to evaluate the security of a computer system or computer
- network. The initial and critical planning phase of penetration
- testing is key to a successful engagement process. In this course,
- you'll explore the fundamentals of penetration testing, including a
- comparison of governance, risk, and compliance concepts. You'll
- examine legal concepts such as service level agreements, statements
- of work, non-disclosure agreements, and master service agreements.
- You'll learn the importance of scoping and organizational and
- customer requirements, including common standards and
- methodologies, rules of engagement, environmental considerations,
- target list definition, and scope of the engagement validation.
- This course is one of a collection that helps prepare learners for
- the CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Professionalism & Integrity
Penetration testers must be ethical in order to avoid any
- illegal activities and to best serve clients. In this course,
- you'll learn how to develop and demonstrate an ethical hacking
- mindset by maintaining integrity and professionalism during
- penetration testing exercises. You'll explore the importance of
- performing background checks on penetration testing team members
- and adhering to the scope of engagement. You'll then examine how to
- identify, handle, and report on security breaches and potential
- findings of a criminal nature. You'll learn how to limit the use of
- tools for a particular engagement and invasiveness based on scope.
- Lastly, you'll learn the importance of maintaining data and
- information confidentiality of data and information and explore
- risks to penetration testing team members. This course is one of a
- collection that helps prepare learners for the CompTIA PenTest+
- (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Passive Reconnaissance
One of the main responsibilities of a penetration tester is to
- gather information by way of reconnaissance. Simply put,
- reconnaissance is the process of collecting as much information as
- possible about a target. In this course, you'll learn how to gather
- information using various passive reconnaissance techniques such as
- DNS lookups, cryptographic flaws, and social media scraping. You'll
- learn how to differentiate between cloud and self-hosted
- reconnaissance and examine valuable data found in password dumps,
- metadata, and public source-code repositories. You'll also explore
- how to use open source intelligence techniques, tools, and sources
- to exploit weaknesses and gather intelligence. This course will
- help prepare learners for the CompTIA PenTest+ PT0-002
- certification exam.
CompTIA PenTest+ (PT0-002): Active Reconnaissance
Active reconnaissance requires a penetration tester to engage
- and interact with the targeted system to gather information and
- identify vulnerabilities. To do this, penetration testers can use
- several different methods including automated scanning and manual
- testing techniques. In this course, you'll learn how to use active
- reconnaissance techniques such as enumeration and web site
- reconnaissance, which are commonly used to gather intelligence
- about hosts, services, and web sites. You'll also learn about
- packet crafting, tokens, wardriving, network traffic, active
- fingerprinting, and defense detection and avoidance techniques.
- This course is one of a collection that helps prepare learners for
- the CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Vulnerability Scanning
Vulnerability scanning is a process used to assess systems for
- known weaknesses. In this course, you'll learn how to configure
- vulnerability scanner settings and scan targets for
- vulnerabilities. You'll explore the different types of scanning
- methods, as well as vulnerability testing tools and common scanning
- themes. Next, you'll learn how to perform a scan analysis. You'll
- also examine the Nmap utility, which is designed to discover hosts
- and services on a computer network. You'll move on to explore Nmap
- Scripting Engine scripts and the numerous switches included in the
- Nmap utility that can helpful in penetration testing. Lastly,
- you'll learn about vulnerability testing tools that can help
- facilitate automation. This course is one of a collection that
- helps prepare learners for the CompTIA PenTest+ (PT0-002)
- certification exam.
CompTIA PenTest+ (PT0-002): Network Attacks & Exploits
Network attacks are commonly performed to gain unauthorized
- access to an organization's network, with a goal of performing
- malicious activity or stealing data. In this course, you'll learn
- how to research attack vectors and perform network attacks. You'll
- learn about password attacks such as password spraying, hash
- cracking, brute force, and dictionary. You'll explore how to
- perform common network attacks such as ARP poisoning, on-path,
- kerberoasting, virtual local area network hopping, as well as
- Link-Local Multicast Name Resolution and NetBIOS Name Service
- poisoning. Finally, you'll explore common network attack tools such
- as Metasploit, Netcat, and Nmap. This course is one of a collection
- that helps prepare learners for the CompTIA PenTest+ (PT0-002)
- certification exam.
CompTIA PenTest+ (PT0-002): Wireless Attacks
The goal of a wireless network attack is generally to capture
- information sent across the network. In this course, you'll learn
- how to research attack vectors and perform wireless attacks. You'll
- explore common wireless network attack methods including
- eavesdropping, data modification, data corruption, relay attacks,
- spoofing, jamming, on-path, and capture handshakes. You'll then
- learn about common network attacks such as evil twin, bluejacking,
- bluesnarfing, radio-frequency identification cloning, amplification
- attacks, and Wi-Fi protected setup PIN attacks. Lastly, you'll
- discover how to use aircrack-ng suite and amplified antenna
- wireless network attack tools. This course is one of a collection
- that helps prepare learners for the CompTIA PenTest+ (PT0-002)
- certification exam.
CompTIA PenTest+ (PT0-002): Application-based Attacks
Application-based attacks are designed to deliberately cause a
- fault in a computer's operating system or applications. In this
- course, you'll learn how to research attack vectors and perform
- application-based attacks. You'll explore the benefits of the OWASP
- Top 10 standard awareness document, which is used to present the
- most critical security risks to web applications. You'll examine
- application-based attacks such as server-side request forgery,
- business logic flaws, and injection attacks. You'll move on to
- learn about application vulnerabilities such as race conditions,
- lack of code signing, and session attacks, as well as the
- characteristics of API attacks such as Restful, Soap, and
- Extensible Markup Language-Remote Procedure Call. Lastly, you'll
- learn about application-based attack tools and resources. This
- course is one of a collection that helps prepare learners for the
- CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Attacks on Cloud Technologies
Penetration testers need to account for all types of systems
- available in an environment. In addition to servers and network
- appliances, this can also include cloud-based systems. In this
- course, you'll learn how to research attack vectors and perform
- attacks on cloud technologies. You'll explore common cloud-based
- attacks, such as credential harvesting, privilege escalation, and
- account takeovers. You'll learn how to identify misconfigured cloud
- assets, including identity and access management and
- containerization technologies. You'll move on to explore how cloud
- malware injection, denial of service, and side-channel attacks can
- exploit a system. Lastly, you'll learn about common cloud tools
- such as the software development kit. This course is one of a
- collection that helps prepare learners for the CompTIA PenTest+
- (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Attacks on Specialized Systems
Specialized systems by nature can be very challenging for
- penetration testers. They can use proprietary operating systems and
- file systems, and may require advanced reverse engineering and
- sandbox analysis. However, specialized systems are also very
- susceptible when it comes to weaknesses and vulnerabilities. In
- this course, you'll learn how to identify common attacks and
- vulnerabilities against specialized systems, including mobile
- systems and Internet of Things devices. You'll also explore common
- vulnerabilities, including data storage system vulnerabilities,
- management interface vulnerabilities, vulnerabilities related to
- virtual environments, and vulnerabilities related to containerized
- workloads. This course is one of a collection that helps prepare
- learners for the CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Social Engineering Attacks
Social engineering involves the psychological manipulation of
- people and it's used to trick them into divulging information or
- performing certain actions. In this course, you'll learn how social
- engineering attacks are performed and how they can be used by
- attackers. You'll explore the pretext for a social engineering
- approach, as well as various social engineering attacks such as
- e-mail phishing, vishing, short message service, phishing,
- universal serial bus drop key, and watering hole. You'll then learn
- about tailgating, dumpster diving, shoulder surfing, and badge
- cloning physical attack methods. Lastly, you'll examine social
- engineering impersonation techniques, methods of influence, and
- tools. This course is one of a collection that helps prepare
- learners for the CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Post-Exploitation Techniques
Cybercriminals use post-exploitation techniques to maintain a
- level of access while they attempt to perform other actions during
- an open session. In this course, you'll learn about
- post-exploitation techniques and tools. You'll explore common
- post-exploitation tools such as Empire, Mimikatz, and BloodHound.
- Next, you'll examine post-exploitation techniques such as lateral
- movement, privilege escalation, and upgrading a restrictive shell.
- You'll learn techniques used to maintain foothold and persistence
- using trojans, backdoors, and daemons. Finally, you'll learn
- detection avoidance techniques, as well as enumeration techniques
- used to extract users, groups, forests, sensitive data, and
- unencrypted files. This course is one of a collection that helps
- prepare learners for the CompTIA PenTest+ (PT0-002) certification
- exam.
CompTIA PenTest+ (PT0-002): Written Reports
A final written report is prepared by a penetration tester or
- testing team to document all findings and recommendations for the
- client once the engagement has completed. In this course, you'll
- learn the critical components of a written report, as well as the
- importance of communication during the penetration testing process.
- You'll explore how to analyze and report on findings, and how to
- securely distribute of the final product. Next, you'll examine
- common content to include in a written report such as an executive
- summary, scope details, methodology, findings, and conclusion.
- Lastly, you'll learn the steps required to properly analyze the
- findings and recommend the appropriate remediation within a report.
- This course is one of a collection that helps prepare learners for
- the CompTIA PenTest+ (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Communication & Post-Report Activities
- During penetration testing, tester activities can leave behind
- remnants that may alter a system. Any action performed during
- testing should be clearly documented. Upon completion of testing,
- penetration testers should perform a series of post-report delivery
- activities that include removing shells, removing tester created
- credentials, and removing any penetration testing tools. In this
- course, you'll explore post-report delivery activities such as
- post-engagement cleanup, client acceptance, lessons learned,
- attestation of findings, as well as data destruction processes and
- best practices. You'll also learn the importance of communication
- during the penetration testing process. This course is one of a
- collection that helps prepare learners for the CompTIA PenTest+
- (PT0-002) certification exam.
CompTIA PenTest+ (PT0-002): Analyzing Tool & Script Output
Scripting languages can be used by penetration testers to help
- automate the execution of common tasks and increase the depth and
- scope of testing coverage. In this course, you'll learn the basic
- concepts of scripting and software development. Explore logic
- constructs concepts such as loops and conditionals, as well as the
- following operators; Boolean, string, and arithmetic. Discover
- other basic concepts of scripting including data structures,
- libraries, classes, procedures, and functions. You then explore how
- to analyze a script or code sample for use in a penetration test.
- Discover shells, programming languages, and exploit codes, and
- learn how to identify opportunities for automation. This course is
- one of a collection that helps prepare learners for the CompTIA
- PenTest+ (PT0-002) certification exam.
CompTIA PenTest+
CompTIA PT0-002
CompTIA - PT0-002: PenTest+
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.
Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.
FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.