Course Description

Learn penetration testing with the CompTIA PenTest+ (PT0-001) course. This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the CompTIA PenTest+ PT0-001 exam. Also included is an extensive step-by-step 47 page Lab Setup Guide that details every aspect of setting up a virtual environment so you can practice all aspects of this training course. We believe this is one of the most comprehensive courses covering penetration testing available anywhere.

This course takes the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are mostly Kali Linux-based. A broad range of real-world examples used by penetration testers and red teams are covered. The CompTIA PenTest+ certification is a much-sought-after security certification. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification.

The pentest course is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification. In this course you will learn hands-on penetration testing and hacking skills including:

  • Client engagement and documentation
  • Passive and active reconnaissance
  • Windows
  • Linux and mobile device system hacking
  • Physical security testing and social engineering
  • Wired and wireless network hacking and exploitation
  • Network service hacking and exploitation
  • Application and web app hacking and exploitation
  • Lateral movement and persistence in a compromised network
  • Covering your tracks
  • Report writing and post-test cleanup

This pentest course is intended for advanced students and cyber security practitioners who will actively test networks and computer systems for vulnerabilities. Successful completion of two pre-requisite courses, Network+ and Security+, is highly recommended.

For more information about the CompTIA certification exam and requirements, visit the CompTIA website.

Course Lesson Video

Take this opportunity to view a sample of Module 8.19 – Denial of Service Attach.

CompTIA PenTest+ (PT0-001) - Penetration Testing

Additional information

26 Hours

217 Course Videos

249 Test Questions

Course Videos

This course contains the following modules and videos. Click the down arror to view video details.

PenTest : 1 - The PenTest Engagement
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act
PenTest : 2 - Passive Reconnaissance
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review
PenTest : 3 - Active Reconnaissance
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License
PenTest : 4 - Physical Security
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review
PenTest : 5 - Social Engineering
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review
PenTest : 6 - Vulnerability Scan Analysis
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review
PenTest : 7 - Password Cracking
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review
PenTest : 8 - Penetrating Wired Networks
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review
PenTest : 9 - Penetrating Wireless Networks
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks
PenTest : 10 - Windows Exploits
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes
PenTest : 11 - Linux Exploits
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review
PenTest : 12 - Mobile Devices
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review
PenTest : 13 - Specialized Systems
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review
PenTest : 14 - Scripts
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review
PenTest : 15 - Application Testing
  • 15.1 Application Testing
  • 15.2 Reverse Engineering
PenTest : 16 - Web App Exploits
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking - SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review
PenTest : 17 - Lateral Movement
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review
PenTest : 18 - Persistence
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review
PenTest : 19 - Cover Your Tracks
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks - Timestomp Files Act
  • 19.3 Cover Your Tracks - Frame the Administrator Act
  • 19.4 Cover Your Tracks - Clear the Event Log Act
  • 19.5 Cover Your Tracks Review
PenTest : 20 - The Report
  • 20.1 The Report
  • 20.2 The Report Review
PenTest : 21 - Post Engagement Cleanup
  • 21.1 Post Engagement Cleanup
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4
CompTIA PenTest+ (PT0-001) - Penetration Testing

Instructor Led Courses

All ITU Courses replicate a live class experience with an instructor on screen delivering the course's theories and concepts.

These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast-forwarded.

CompTIA PenTest+ (PT0-001) - Penetration Testing

Visual Demonstrations, Educational Games & Flashcards

ITU recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we deliver our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.

CompTIA PenTest+ (PT0-001) - Penetration Testing

Mobile Optimization & Progress Tracking

Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.

CompTIA PenTest+ (PT0-001) - Penetration Testing

Practice Quizzes and Exams

ITU Online's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.

CompTIA PenTest+ (PT0-001) - Penetration Testing

World Class Learning Management System

ITU provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Need help? Call our support team at (855) 488-5327

ITU Online IT Training

ITU Online IT Training

PGlmcmFtZSBzcmM9Imh0dHBzOi8vd3d3Lmdvb2dsZS5jb20vbWFwcy9lbWJlZD9wYj0hMW0xOCExbTEyITFtMyExZDYwNDQuMjc1NjM3NDU2ODA1ITJkLTczLjk4MzQ2MzY4MzI1MjA0ITNkNDAuNzU4OTkzNDExNDc4NTMhMm0zITFmMCEyZjAhM2YwITNtMiExaTEwMjQhMmk3NjghNGYxMy4xITNtMyExbTIhMXMweDAlM0EweDU1MTk0ZWM1YTFhZTA3MmUhMnNUaW1lcytTcXVhcmUhNWUwITNtMiExc2VuITJzITR2MTM5MjkwMTMxODQ2MSIgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAwJSIgZnJhbWVib3JkZXI9IjAiIHN0eWxlPSJib3JkZXI6MCI+PC9pZnJhbWU+
Thank You. We will contact you as soon as possible.
COMPANY NAME
CONTACT US
Dolor aliquet augue augue sit magnis, magna aenean aenean et! Et tempor, facilisis cursus turpis tempor odio putonius mudako empero brutto populius giten facilisis cursus turpis balocus tredium todo.
Thank You. We will contact you as soon as possible.
PGlmcmFtZSB3aWR0aD0iMTAwJSIgaGVpZ2h0PSIxMDAlIiBzcmM9Ii8vd3d3LnlvdXR1YmUuY29tL2VtYmVkL3NCV1BDdmR2OEJrP2F1dG9wbGF5PTEiIGZyYW1lYm9yZGVyPSIwIiBhbGxvd2Z1bGxzY3JlZW4+PC9pZnJhbWU+
ENJOY AURORA BOREALIS

WIN A FULL YEAR
OF IT TRAINING

Subscribe now to get special offers and discounts. By subscribing you will also be entered into our monthly drawing to win 1 full year of free ITU training.
Your Name
Your Email
WIN 1 YEAR OF FREE TRAINING
Subscribe to our mailing list and automatically be entered into our monthly drawing to win 1 year of free training from ITU Online.
2019 (C) All rights reserved.
We respect your privacy and will not sell your email
to any third party.
Congratulations to Christian H. of New Albany, OH, our June 2019 Winner!
Drop a line.
This is Layered Popups' version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis.
2016 (C) All rights reserved.
WELCOME!
Subscribe to our free newsletter and win some prizes. Enter your email below and get updates and news weekly.
We never share your data with 3rd parties.
2018 (C) All rights reserved.
Subscribe Now
Get some fresh designer freebies by subscribing to our daily newsletter.
2016 (C) All rights reserved.