{"id":13061,"date":"2022-08-15T14:11:09","date_gmt":"2022-08-15T11:11:09","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13061"},"modified":"2024-12-22T17:46:29","modified_gmt":"2024-12-22T14:46:29","slug":"penetration-test-plus","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/penetration-test-plus\/","title":{"rendered":"CompTIA Penetration Testing (PenTest+) Course"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: justify;\">In this course, you will learn the latest pen testing techniques, attack surfaces, vulnerability management, post-delivery, and compliance tasks. The CompTIA PenTest+ certification is a vendor-neutral, internationally targeted validation of intermediate-level penetration testing (or pen testing) knowledge and skills.<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">The skills covered by CompTIA PenTest+ help companies comply with regulations, such as PCI-DSS and NIST 800-53 Risk Management Framework (RMF), which require pen tests, vulnerability assessments, and reports. CompTIA PenTest+ is approved under the Department of Defense (DoD) Directive 8140\/8570.01-M and under ANSI\/ISO standard 17024.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: justify;\">Planning and scoping a penetration testing engagement<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Understanding legal and compliance requirements<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Performing vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyzing the results<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Producing a written report containing proposed remediation techniques, effectively communicating results to the management team, and providing practical recommendations<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Module 1: Planning and Scoping<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Module 2: Information Gathering and Vulnerability Scanning<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Module 3: Attacks and Exploits<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Module 4: Reporting and Communication<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Module 5: Tools and Code Analysis<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">3-4 years of hands-on information security or related experience<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Network+, Security+, or equivalent knowledge<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>LAB Requirement<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">It is recommended to have LAB in this course<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Exam requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">There are no specific prerequisites required to attend the Exam<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 1: Planning and Scoping<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: justify;\">Compare and contrast governance, risk, and compliance concepts.<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Explain the importance of scoping and organizational\/customer requirements.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 2: Information Gathering and Vulnerability Scanning<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, perform passive reconnaissance<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, perform active reconnaissance<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, analyze the results of a reconnaissance exercise<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, perform vulnerability scanning<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 3: Attacks and Exploits<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, research attack vectors and perform network attacks.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, research attack vectors and perform wireless attacks.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, research attack vectors and perform application-based attacks<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, research attack vectors and perform attacks on cloud technologies.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain common attacks and vulnerabilities against specialized systems<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, perform a social engineering or physical attack.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, perform post-exploitation techniques.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 4: Reporting and Communication<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Compare and contrast important components of written reports.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, analyze the findings and recommend the appropriate remediation within a report.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the importance of communication during the penetration testing process.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain post-report delivery activities.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 5: Tools and Code Analysis<\/p>\n<ul>\n<li dir=\"ltr\" style=\"text-align: justify;\">Explain the basic concepts of scripting and software development<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Given a scenario, analyze a script or code sample for use in a penetration test.<\/li>\n<li dir=\"ltr\" style=\"text-align: justify;\">Explain the use cases of the following tools during the phases of a penetration test.<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13293,"template":"","course_category":[74,38],"class_list":["post-13061","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-compatia-en","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":11,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13061\/revisions"}],"predecessor-version":[{"id":27668,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13061\/revisions\/27668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13293"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13061"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}