CompTIA Pentest+ Certification Preparation Training
Program Overview
CompTIA PenTest+ Certification Preparation (PT0-001)
CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.
CompTIA PenTest+ joins CompTIA Cybersecurity Analyst (CySA+) at the intermediate-skills level of the cybersecurity career pathway. Depending on your Program of study, PenTest+ and CySA+ can be taken in any order but typically follows the skills learned in Security+. While CySA+ focuses on defense through incident detection and response, PenTest+ focuses on offense through penetration testing and vulnerability assessment.
Although the two exams teach opposing skills, they are dependent on one another. The most qualified cybersecurity professionals have both offensive and defensive skills. Earn the PenTest+ certification to grow your career within the CompTIA recommended cybersecurity career pathway.
Income Expectation
$92,600/yr
The average salary for a CompTIA Pentest+ Certified Employee is $92,600 in New York City. Salary estimates are provided by CompTIA.
Intended Audience For This CompTIA PenTest+ Certification (Exam PT0-001) Program
- Penetration Tester
- Vulnerability Tester
- Security Analyst (II)
- Vulnerability Assessment Analyst
- Network Security Operations
- Application Security Vulnerability
Program Prerequisites For CompTIA PenTest+ Certification (Exam PT0-001)
CompTIA Security+ Certification
Program Objectives
CompTIA PenTest+ Certification (Exam PT0-001)
Plan and scope an assessment
Understand legal and compliance requirements
Perform vulnerability scanning and penetration testing using appropriate tools and techniques
Analyze the results
Produce a written report containing proposed remediation techniques
Effectively communicate results to management
Provide practical recommendations
Program Outline
CompTIA PenTest+ Certification (Exam PT0-001)
Planning and Scoping
1. Explain the importance of planning for an engagement
Understanding the target audience
Rules of engagement
Communication escalation path
Resources and requirements
- Confidentiality of findings
- Known vs. unknown
Budget
Impact analysis and remediation timelines
Disclaimers
- Point-in-time assessment
- Comprehensiveness
Technical constraints
Support resources
- WSDL/WADL
- SOAP project file
- SDK documentation
- Swagger document
- XSD
- Sample application requests
- Architectural diagrams
- Explain key legal concepts
- Contracts
- SOW
- MSA
- NDA
- Environmental differences
- Export restrictions
- Local and national government restrictions
- Corporate policies
- Written authorization
- Obtain signature from proper signing authority
- Third-party provider authorization when necessary
- Explain the importance of scoping an engagement properly
Types of assessment
- Goals-based/objectives-based
- Compliance-based
- Red team
- Special scoping considerations
- Premerger
- Supply chain
- Target selection
- Targets
- Internal
- On-site vs. off-site
- Considerations
- White-listed vs. black-listed
- Security exceptions
- IPS/WAF whitelist
- NAC
- Certificate pinning
- Company’s policies
- Black box vs. white box vs. gray box
- Risk acceptance
- Tolerance to impact
- Scheduling
- Scope creep
- Threat actors
- Adversary tier
- APT
- Adversary tier
- Compliance-based assessments, limitations, and caveats
- Rules to complete assessment
- Password policies
- Data isolation
- Key management
- Limitations
- Limited network access
- Limited storage access
2. Information Gathering and Vulnerability Identification
- Given a scenario, conduct information gathering using appropriate techniques
- Scanning
- Enumeration
- Hosts
- Networks
- Domains
- Users
- Groups
- Network shares
- Web pages
- Applications
- Services
- Tokens
- Social networking sites
- Packet crafting
- Packet inspection
- Fingerprinting
- Cryptography
- Certificate inspection
- Eavesdropping
- RF communication monitoring
- Sniffing
- Wired
- Wireless
- Decompilation
- Debugging
- Open Source Intelligence Gathering
- Sources of research
- CERT
- NIST
- JPCERT
- CAPEC
- Full disclosure
- CVE
- CWE
- Given a scenario, perform a vulnerability scan
- Credentialed vs. non-credentialed
- Types of scans
- Discovery scan
- Full scan
- Stealth scan
- Compliance scan
- Container security
- Application scan
- Dynamic vs. static analysis
- Considerations of vulnerability scanning
- Time to run scans
- Protocols used
- Network topology
- Bandwidth limitations
- Query throttling
- Fragile systems/non-traditional assets
- Given a scenario, analyze vulnerability scan results.
- Asset categorization
- Adjudication
- False positives
- Prioritization of vulnerabilities
- Common themes
- Vulnerabilities
- Observations
- Lack of best practices
- Explain the process of leveraging information to prepare for exploitation.
- Map vulnerabilities to potential exploits
- Prioritize activities in preparation for penetration test
- Describe common techniques to complete attack
- Cross-compiling code
- Exploit modification
- Exploit chaining
- Proof-of-concept development (exploit development)
- Social engineering
- Credential brute forcing
- Dictionary attacks
- Rainbow tables
- Deception
- Explain weaknesses related to specialized systems
- ICS
- SCADA
- Mobile
- IoT
- Embedded
- Point-of-sale system
- Biometrics
- Application containers
- RTOS
3. Attacks and Exploits
- Compare and contrast social engineering attacks
- Phishing
- Spear phishing
- SMS phishing
- Voice phishing
- Whaling
- Elicitation
- Business email compromise
- Interrogation
- Impersonation
- Shoulder surfing
- USB key drop
- Motivation techniques
- Authority
- Scarcity
- Social proof
- Urgency
- Likeness
- Fear
- Given a scenario, exploit network-based vulnerabilities
- Name resolution exploits
- NETBIOS name service
- LLMNR
- SMB exploits
- SNMP exploits
- SMTP exploits
- FTP exploits
- DNS cache poisoning
- Pass the hash
- Man-in-the-middle
- ARP spoofing
- Replay
- Relay
- SSL stripping
- Downgrade
- DoS/stress test
- NAC bypass
- VLAN hopping
- Name resolution exploits
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Evil twin
- Karma attack
- Downgrade attack
- Deauthentication attacks
- Fragmentation attacks
- Credential harvesting
- WPS implementation weakness
- Bluejacking
- Bluesnarfing
- RFID cloning
- Jamming
- Repeating
- Evil twin
- Given a scenario, exploit application-based vulnerabilities
- Injections
- SQL
- HTML
- Command
- Code
- Authentication
- Credential brute forcing
- Session hijacking
- Redirect
- Default credentials
- Weak credentials
- Kerberos exploits
- Authorization
- Parameter pollution
- Insecure direct object reference
- Cross-site scripting (XSS)
- Stored/persistent
- Reflected
- DOM
- Cross-site request forgery (CSRF/XSRF)
- Clickjacking
- Security misconfiguration
- Directory traversal
- Cookie manipulation
- File inclusion
- Local
- Remote
- Unsecure code practices
- Comments in source code
- Lack of error handling
- Overly verbose error handling
- Hard-coded credentials
- Race conditions
- Unauthorized use of functions/unprotected APIs
- Hidden elements
- Sensitive information in the DOM
- Lack of code signing
- Injections
- Given a scenario, exploit local host vulnerabilities
- OS vulnerabilities
- Windows
- Mac OS
- Linux
- Android
- iOS
- OS vulnerabilities
- Unsecure service and protocol configurations
- Privilege escalation
- Linux-specific
- SUID/SGID programs
- Unsecure SUDO
- Ret2libc
- Sticky bits
- Windows-specific
- Cpassword
- Clear text credentials in LDAP
- Kerberoasting
- Credentials in LSASS
- Unattended installation
- SAM database
- DLL hijacking
- Exploitable services
- Unquoted service paths
- Writable services
- Unsecure file/folder permissions
- Keylogger
- Scheduled tasks
- Kernel exploits
- Default account settings
- Sandbox escape
- Shell upgrade
- VM
- Container
- Physical device security
- Cold boot attack
- JTAG debug
- Serial console
- Summarize physical security attacks related to facilities
- Piggybacking/tailgating
- Fence jumping
- Dumpster diving
- Lock picking
- Lock bypass
- Egress sensor
- Badge cloning
- Given a scenario, perform post-exploitation techniques
- Lateral movement
- RPC/DCOM
- PsExec
- WMI
- Scheduled tasks
- PS remoting/WinRM
- SMB
- RDP
- Apple Remote Desktop
- VNC
- X-server forwarding
- Telnet
- SSH
- RSH/Rlogin
- Lateral movement
- Persistence
- Scheduled jobs
- Scheduled tasks
- Daemons
- Back doors
- Trojan
- New user creation
- Covering your tracks
Penetration Testing Tools
- Given a scenario, use Nmap to conduct information gathering exercises
- SYN scan (-sS) vs. full connect scan (-sT)
- Port selection (-p)
- Service identification (-sV)
- OS fingerprinting (-O)
- Disabling ping (-Pn)
- Target input file (-iL)
- Timing (-T)
- Output parameters
- -oA
- -oN
- -oG
- -oX
- Compare and contrast various use cases of tools
- Use cases
- Reconnaissance
- Enumeration
- Vulnerability scanning
- Credential attacks
- Offline password cracking
- Brute-forcing services
- Persistence
- Configuration compliance
- Evasion
- Decompilation
- Forensics
- Debugging
- Software assurance
- Fuzzing
- SAST
- DAST
- Tools
- Scanners
- Nikto
- OpenVAS
- SQLmap
- Nessus
- Credential testing tools
- Hashcat
- Medusa
- Hydra
- Cewl
- John the Ripper
- Cain and Abel
- Mimikatz
- Patator
- Dirbuster
- W3AF
- Debuggers
- OLLYDBG
- Immunity debugger
- GDB
- WinDBG
- IDA
- Software assurance
- Findbugs/findsecbugs
- Peach
- Dynamo
- AFL
- SonarQube
- YASCA
- OSINT
- Whois
- Nslookup
- Foca
- Theharvester
- Shodan
- Maltego
- Recon-NG
- Censys
- Wireless
- Aircrack-NG
- Kismet
- WiFite
- Web proxies
- OWASP ZAP
- Burp Suite
- Social engineering tools
- SET
- BeEF
- Remote access tools
- SSH
- NCAT
- NETCAT
- Proxychains
- Networking tools
- Wireshark
- Hping
- Mobile tools
- Androzer
- APKX
- APK studio
- MISC
- Searchsploit
- Powersploit
- Responder
- Impacket
- Empire
- Metasploit framework
- Given a scenario, analyze tool output or data related to a penetration test
- Password cracking
- Pass the hash
- Setting up a bind shell
- Getting a reverse shell
- Proxying a connection
- Uploading a web shell
- Injections
- Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
- Logic
- Looping
- Flow control
- I/O
- File vs. terminal vs. network
- Substitutions
- Variables
- Common operations
- String operations
- Comparisons
- Error handling
- Arrays
- Encoding/decoding
- Logic
Reporting and Communication
- Given a scenario, use report writing and handling best practices
- Normalization of data
- Written report of findings and remediation
- Executive summary
- Methodology
- Findings and remediation
- Metrics and measures
- Risk rating
- Conclusion
- Risk appetite
- Storage time for report
- Secure handling and disposition of reports
- Explain post-report delivery activities
- Post-engagement cleanup
- Removing shells
- Removing tester-created credentials
- Removing tools
- Client acceptance
- Lessons learned
- Follow-up actions/retest
- Attestation of findings
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Solutions
- People
- Process
- Technology
- Findings
- Shared local administrator credentials
- Weak password complexity
- Plain text passwords
- No multifactor authentication
- SQL injection
- Unnecessary open services
- Remediation
- Randomize credentials/LAPS
- Minimum password requirements/password filters
- Encrypt the passwords
- Implement multifactor authentication
- Sanitize user input/parameterize queries
- System hardening
- Solutions
- Explain the importance of communication during the penetration testing process
- Communication path
- Communication triggers
- Critical findings
- Stages
- Indicators of prior compromise
- Reasons for communication
- Situational awareness
- De-escalation
- De-confliction
- Goal reprioritization
- Communication path
Next Steps after taking this CompTIA PenTest+ Certification Prep (Exam PT0-001)
CompTIA Advanced Security Practitioner (CASP) Certification Prep
SCHEDULE DATES - 35 Hour Hands-On Program
CompTIA PenTest+
9AM - 5PM (Weekdays)
Start Date & Graduation Date
03/21/2022 to 03/25/2022
5 Days (35 Hours) a Week for 1 Week
|
||||
CompTIA PenTest+
9AM - 5PM (Weekdays)
Start Date & Graduation Date
04/11/2022 to 04/15/2022
5 Days (35 Hours) a Week for 1 Week
|
||||
CompTIA PenTest+
9AM - 5PM (Weekdays)
Start Date & Graduation Date
05/02/2022 to 05/06/2022
5 Days (35 Hours) a Week for 1 Week
|
||||
CompTIA PenTest+
9AM - 5PM (Weekdays)
Start Date & Graduation Date
06/13/2022 to 06/17/2022
5 Days (35 Hours) a Week for 1 Week
|
||||
CompTIA PenTest+
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/11/2022 to 07/15/2022
5 Days (35 Hours) a Week for 1 Week
|
CompTIA PenTest+
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
03/21/2022
03/25/2022 |
5 Days (35 Hours) a Week for 1 Week | |
CompTIA PenTest+
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
04/11/2022
04/15/2022 |
5 Days (35 Hours) a Week for 1 Week | |
CompTIA PenTest+
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
05/02/2022
05/06/2022 |
5 Days (35 Hours) a Week for 1 Week | |
CompTIA PenTest+
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
06/13/2022
06/17/2022 |
5 Days (35 Hours) a Week for 1 Week | |
CompTIA PenTest+
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
07/11/2022
07/15/2022 |
5 Days (35 Hours) a Week for 1 Week |
- CompTIA
- CISCO
- EC-Council
As an authorized CompTIA partner, Institute of Information Technology offers up-to-date CompTIA training and certification courses. A CompTIA certification is an international industry credential.
- CompTIA A+
- CompTIA Network+
- CompTIA A+ and Network+ Boot Camp
- IT Professional Bootcamp
- CompTIA Security+
- CompTIA Server+
- CompTIA Project+
- CompTIA Cybersecurity Analyst (CySA+)
- CompTIA Train The Trainer (CTT+)
- CompTIA Cloud+ Training
- CompTIA PenTest+ Certification Training
- CompTIA CDIA+
- CompTIA Linux+ Powered by LPI
- CompTIA Advanced Security Practitioner (CASP) Training
- Network and System Administrator
- Computer Support Specialist
- Computer Systems Networking and Telecommunications Specialist
- Network and System Administrator Manager
- Computer Support Aadministrator
- Computer And Information Systems Security Analyst
- Computer Systems Networking and Telecommunications Administrator
- Computer Systems Networking And Telecommunications Manager
- Network And System Administrator Manager Professional
Institute of Information Technology is honored to be an authorized CISCO Network Academy Training Institute. CISCO is the worldwide leader in networking. CISCO has shaped the future of the internet by transforming how people connect, communicate and collaborate.
- CISCO MASTER
- Interconnecting Cisco Networking Devices, Part 1 - ICND1
- Interconnecting Cisco Networking Devices, Part 2 - ICND2
- CCNA Routing and Switching
- CCNP Routing and Switching
- CISCO-Individualized CCNA Routing and Switching
- CCNA Security
- CCNP Security
- CCNA Collaboration
- CCNP Collaboration
- CCNA Service Provider
- CCNP Service Provider
- Implementing Cisco Collaboration Devices
- Implementing Cisco Video Network Devices
- Troubleshooting Cisco IP Telephony & Video
- Implementing Cisco Collaboration Application
- Implementing Cisco IP Telephony & Video, Part 1
- Implementing Cisco IP Telephony & Video, Part 2
Institute of Information Technology has the honor of being an authorized EC-Council Accredited Training Center. EC-Council is the worldwide leader in Cyber Security course content. EC-Council has changed the future of the internet by transforming how people deal with and prevent cyberattack.
- Hacking Apprentice
- Hacking Professional
- Cybersecurity Master
- Hacking Master
- Certified Ethical Hacker Training Program C| EH
- Certified Ethical Hacker Practical C| EH
- Certified Network Defender Certification C| ND
- Licensed Penetration Tester Master L| PT (Master)
- Computer Hacking Forensic Investigator Certification C| HFI
- EC-Council Certified Security Analyst (ECSA) Penetration Testing
- Certified Secure Computer User C| SCU
- Certified Network Defense Architect C| NDA
- Project Management in IT Security P| MIT
- EC-Council Network Security Administrator E| NSA
- Certified Cyber Marketing Professional C| CMP
- EC- Council Certified Incident Handler Program E| CIH
- EC-Council Certified Security Specialist E| CSS
- EC-Council Certified Secure Programmer .NET E| CSP
- EC-Council Certified Disaster Recovery E| CDR
- Virtualization Technology Professional E| CVT
- EC-Council Certified Encryption Specialist E| CES
- EC-COUNCIL DISASTER RECOVERY PROFESSIONAL E| DRP
- Advanced Network Defense (CAST 614)
- Certified Application Security Engineer (CASE)
- Cyber Security Boot Camp