Login     Signup
   info@zetlantechnologies.com        +91-8680961847


CompTIA PenTest+ Cybersecurity Professionals



Demonstrate Competency of Current Trends

Unlike other penetration testing exams that only cover a portion of stages with essay questions and hands-on, CompTIA PenTest+ uses both performance-based and knowledge-based questions to ensure all stages are addressed.

Become an Expert in Vulnerability Management

CompTIA PenTest+ is the only exam on the market covering hands-on vulnerability assessment, scanning and analysis, as well as planning, scoping, and managing weaknesses.

Prove You Know the Latest Techniques

CompTIA PenTest+ requires a candidate to demonstrate the most relevant pen testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT) and traditional on-premises.



Image

CompTIA PenTest+

CompTIA PenTest+ is for Cybersecurity Professionals

  • CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.
  • Planning and Scoping Includes updated techniques emphasizing governance, risk and compliance concepts, scoping and organizational/customer requirements, and demonstrating an ethical hacking mindset
  • Information Gathering and Vulnerability Scanning Includes updated skills on performing vulnerability scanning and passive/active reconnaissance, vulnerability management, as well as analyzing the results of the reconnaissance exercise


Course Details

1. The Pen Test Engagement

  • PenTest Plus Introduction
  • PenTest Engagement
  • Threat Modelling
  • Technical Constraints
  • PenTest Engagement Review
  • Examining PenTest Engagement Documents Act

  • Passive Reconnaissance
  • WHOIS Act
  • Google Hacking Act
  • DNS Querying Act
  • Email Server Querying Act
  • SSL-TLS Certificates
  • Shodan Act
  • The Havester
  • The Harvester Act
  • Recon-ng
  • Recon-g Act
  • Recon-ng-API-key Act
  • Maltego
  • Have I been Pwned
  • Punked and Owned Pwned Act
  • Fingerprinting Organization with Collected Archives
  • FOCA Act
  • Findings Analysis Weaponization
  • Chp 2

  • Active Reconnaissance
  • Discovery Scans Act
  • Nmap
  • Nmap Scans Types Act
  • Nmap Options
  • Nmap Options Act
  • Stealth Scans
  • Nmap Stealth Scans Act
  • Full Scans
  • Full Scans Act
  • Packet Crafting
  • Packet Crafting Act
  • Network Mapping
  • Metasploit
  • Scanning with Metasploit Act
  • Enumeration
  • Banner Grabbing Act
  • Windows Host Enumeration
  • Windows Host Enumeration Act
  • Linux Host Enumeration
  • Linux Host Enumeration Act
  • Service Enumeration
  • Service Enumeration Act
  • Network Shares
  • SMB Share Enumeration Act
  • NFS Network Share Enumeration
  • NFS Share Enumeration Ac
  • Null Sessions
  • Null Sessions Act
  • Website Enumeration
  • Website Enumeration Act
  • Vulnerability Scans
  • Compliance Scans Act
  • Credentialed Non-credentialed Scans
  • Using Credentials in Scans Act
  • Server Service Vulnerability Scan
  • Vulnerability Scanning Act
  • Web Server Database Vulnerability Scan
  • SQL Vulnerability Scanning Act
  • Vulnerability Scan OpenVAS Act
  • Web App Vulnerability Scan
  • Web App Vulnerability Scanning Act
  • Network Device Vulnerability Scan
  • Network Device Vuln Scanning Act
  • Nmap Scripts
  • Using Nmap Scripts for Vuln Scanning Act
  • Packet Crafting for Vulnerability Scans
  • Firewall Vulnerability Scans
  • Wireless Access Point Vulnerability
  • Wireless AP Scans Act
  • WAP Vulnerability Scans
  • Container Security issues
  • How to Update Metasploit Pro Expired Trial License

  • Physical Security
  • Badge Cloning Act

  • Social Engineering
  • Using Baited USB Stick Act
  • Using Social Engineering to Assist Attacks
  • Phishing Act

  • Vulnerability Scan Analysis
  • Validating Vulnerability Scan Results Act

  • Password Cracking
  • Brute Force Attack Against Network Service Act
  • Network Authentication Interception Attack
  • Intercepting Network Authentication Act
  • Pass the Hash Attacks
  • Pass the Hash Act

  • Penetrating Wired Network
  • Sniffing Act
  • Eavesdropping
  • Eavesdropping Act
  • ARP Poisoning
  • ARP Poisoning Act
  • Man in The Middle
  • MITM Act
  • TCP Session Hijacking
  • Server Message Blocks SMB Exploits
  • SMB Attack Act
  • Web Server Attacks
  • FTP Attacks
  • Telnet Server Attacks
  • SSH Server Attacks
  • Simple Network Mgmt Protocol SNMP
  • Simple Mail Transfer Protocol SMTP
  • Domain Name System DNS Cache Poisoning
  • Denial of Service Attack DoS-DDoS
  • DoS Attack Act
  • VLAN Hopping Review

  • Penetrating Wireless Networks
  • Jamming Act
  • Wireless Sniffing
  • Replay Attacks
  • WEP Cracking Act
  • WPA-WPA2 Cracking
  • WAP Cracking Act
  • Evil Twin Attacks
  • Evil Twin Attack Act
  • Wi-Fi Protected Setup
  • Bluetooth Attacks

  • Windows Exploits
  • Dumping Stored Passwords Act
  • Dictionary Attacks
  • Dictionary Attack Against Windows Act
  • Rainbow Table Attacks
  • Credential Brute Force Attacks
  • Keylogging Attack Act
  • Windows Kernel
  • Kernel Attack Act
  • Windows Components
  • Memory Vulnerabilities
  • Buffer Overflow Attack Act
  • Privileged Escalation in Windows
  • Windows Accounts
  • Net and WMIC Commands
  • Sandboxes

  • Linux Exploits
  • Exploiting Common Linux Features Act
  • Password Cracking in Linux
  • Cracking Linux Passwords Act
  • Vulnerability Linux
  • Privilege Escalation Linux
  • Linux Accounts

  • Mobile Devices
  • Hacking Android Act
  • Apple Exploits
  • Specialized Systems

  • Scripts
  • Powershell
  • Python
  • Ruby
  • Common Scripting Elements
  • Ping Sweep
  • Simple Port Scanner2
  • Multitarget Port Scanner
  • Port Scanner with Nmap

  • Application Testing
  • Web App Exploits
  • Webb App Exploits
  • Injection Attacks
  • HTML Injection
  • SQL Hacking – SQL map Act
  • Cross-Site Attacks
  • Cross-Site Request Forgery
  • Other Web-based Attacks
  • File Inclusion Attacks
  • Web Shells
  • Web Shells Review

  • Lateral Movement
  • Lateral Movement with Remote Mgmt Services
  • Process Migration Act
  • Passing Control Act
  • Pivoting
  • Tools the Enable Pivoting
  • Lateral Movement Review

  • Persistence
  • Breeding RATS Act
  • Bind and Reverse Shells
  • Bind Shells Act
  • Reverse Shells
  • Reverse Shells Act
  • Netcat
  • Netcat Act
  • Scheduled Tasks
  • Scheduled Tasks Act
  • Services and Domains

  • Cover Your Tracks
  • Cover Your Tracks - Timestamp Files Act
  • Cover Your Tracks - Frame the Administrator Act
  • Cover Your Tracks - Clear the Event Log Act


Fees Structure : 22500 INR / 270 USD
Total No of Class : 192 Video Class
Class Duration : 48:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 40000 INR / 479 USD
Class Duration : 80 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online