Description:
PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
Who Should Attend?
- Penetration Tester
- Security Consultant
- Cloud Penetration Tester
- Web App Penetration Tester
- Cloud Security Specialist
- Network & Security Specialist
- Information Security Engineer
- Security Analyst
Prerequisites:
Students should have CompTIA Network+ and Security+ certifications, or have equivalent knowledge / experience. Recommend minimum of 3-4 years of hands-on information security or related experience. PenTest+ has a technical, hands-on focus and is intended to follow CompTIA Security+ or equivalent experience.
Tuition:
$2,499.00
Credits:
3.5 CEU's
Class Type:
This course is currently being offered in the following training modalities:
- Online
- Virtual Instructor-Led
- Class Length: This class is listed as a 5-day course.
- Virtual Instructor-Led
Learning Outcomes:
In this course you will learn how to:
- Plan and scope a penetration testing engagement
- Understand legal and compliance requirements
- Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results
- Produce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendations
Course Outline:
Lesson 1: Scoping Organizational/Customer Requirements
- Topic 1A: Define Organizational PenTesting
- Topic 1B: Acknowledge Compliance Requirements
- Topic 1C: Compare Standards and Methodologies
- Topic 1D: Describe Ways to Maintain Professionalism
Lesson 2: Defining the Rules of Engagement
- Topic 2A: Assess Environmental Considerations
- Topic 2B: Outline the Rules of Engagement
- Topic 2C: Prepare Legal Documents
Lesson 3: Footprinting and Gathering Intelligence
- Topic 3A: Discover the Target
- Topic 3B: Gather Essential Data
- Topic 3C: Compile Website Information
- Topic 3D: Discover Open-Source Intelligence Tools
Lesson 4: Evaluating Human and Physical Vulnerabilities
- Topic 4A: Exploit the Human Psyche
- Topic 4B: Summarize Physical Attacks
- Topic 4C: Use Tools to Launch a Social Engineering Attack
Lesson 5: Preparing the Vulnerability Scan
- Topic 5A: Plan the Vulnerability Scan
- Topic 5B: Detect Defenses
- Topic 5C: Utilize Scanning Tools
Lesson 6: Scanning Logical Vulnerabilities
- Topic 6A: Scan Identified Targets
- Topic 6B: Evaluate Network Traffic
- Topic 6C: Uncover Wireless Assets
Lesson 7: Analyzing Scanning Results
- Topic 7A: Discover Nmap and NSE
- Topic 7B: Enumerate Network Hosts
- Topic 7C: Analyze Output from Scans
Lesson 8: Avoiding Detection and Covering Tracks
- Topic 8A: Evade Detection
- Topic 8B: Use Steganography to Hide and Conceal
- Topic 8C: Establish a Covert Channel
Lesson 9: Exploiting the LAN and Cloud
- Topic 9A: Enumerating Hosts
- Topic 9B: Attack LAN Protocols
- Topic 9C: Compare Exploit Tools
- Topic 9D: Discover Cloud Vulnerabilities
- Topic 9E: Explore Cloud-Based Attacks
Lesson 10: Testing Wireless Networks
- Topic 10A: Discover Wireless Attacks
- Topic 10B: Explore Wireless Tools
Lesson 11: Targeting Mobile Devices
- Topic 11A: Recognize Mobile Device Vulnerabilities
- Topic 11B: Launch Attacks on Mobile Devices
- Topic 11C: Outline Assessment Tools for Mobile Devices
Lesson 12: Attacking Specialized Systems
- Topic 12A: Identify Attacks on the IoT
- Topic 12B: Recognize Other Vulnerable Systems
- Topic 12C: Explain Virtual Machine Vulnerabilities
Lesson 13: Web Application-Based Attacks
- Topic 13A: Recognize Web Vulnerabilities
- Topic 13B: Launch Session Attacks
- Topic 13C: Plan Injection Attacks
- Topic 13D: Identify Tools
Lesson 14: Performing System Hacking
- Topic 14A: System Hacking
- Topic 14B: Use Remote Access Tools
- Topic 14C: Analyze Exploit Code
Lesson 15: Scripting and Software Development
- Topic 15A: Analyzing Scripts and Code Samples
- Topic 15B: Create Logic Constructs
- Topic 15C: Automate Penetration Testing
Lesson 16: Leveraging the Attack: Pivot and Penetrate
- Topic 16A: Test Credentials
- Topic 16B: Move Throughout the System
- Topic 16C: Maintain Persistence
Lesson 17: Communicating During the PenTesting Process
- Topic 17A: Define the Communication Path
- Topic 17B: Communication Triggers
- Topic 17C: Use Built-In Tools for Reporting
Lesson 18: Summarizing Report Components
- Topic 18A: Identify Report Audience
- Topic 18B: List Report Contents
- Topic 18C: Define Best Practices for Reports
Lesson 19: Recommending Remediation
- Topic 19A: Employ Technical Controls
- Topic 19B: Administrative and Operational Controls
- Topic 19C: Physical Controls
Lesson 20: Performing Post-Report Delivery Activities
- Topic 20A: Post-Engagement Cleanup
- Topic 20B: Follow-Up Actions