CompTIA PenTest+ equips you with the advanced penetration testing and vulnerability assessment skills needed to identify, exploit, report, and manage security weaknesses—empowering you to launch a career in offensive security and become a proactive defender of digital infrastructure.
What is CertMaster Learn integrated with CertMaster Labs?
CertMaster Learn is an interactive eLearning platform designed to build the knowledge and hands-on skills essential for success in CompTIA certification exams and cybersecurity careers.
CertMaster Labs complement this by providing realistic, scenario-based exercises that allow learners to practice penetration testing techniques in real-world environments. These labs use actual software and tools, offer guided feedback and hints, and deliver performance scores to help learners refine their skills and improve efficiency in executing security tasks.
In this integrated system, CertMaster Labs are seamlessly embedded as Study Tasks within the CertMaster Learn Learning Plan, enabling easy access through a single login for a smooth and effective learning experience.
Topics Covered
- Lesson 1: Scoping Organization/Customer Requirements
- Lesson 2: Defining the Rules of Engagement
- Lesson 3: Footprinting and Gathering Intelligence
- Lesson 4: Evaluating Human and Physical Vulnerabilities
- Lesson 5: Preparing the Vulnerability Scan
- Lesson 6: Scanning Logical Vulnerabilities
- Lesson 7: Analyzing Scanning Results
- Lesson 8: Avoiding Detection and Covering Tracks
- Lesson 9: Exploiting the LAN and Cloud
- Lesson 10: Testing Wireless Networks
- Lesson 11: Targeting Mobile Devices
- Lesson 12: Attacking Specialized Systems
- Lesson 13: Web Application-Based Attacks
- Lesson 14: Performing System Hacking
- Lesson 15: Scripting and Software Development
- Lesson 16: Leveraging the Attack: Pivot and Penetrate
- Lesson 17: Communicating During the PenTesting Process
- Lesson 18: Summarizing Report Components
- Lesson 19: Recommending Remediation
- Lesson 20: Performing Post-Report Delivery Activities
Integrated Labs:
- Assisted Lab: Exploring the Lab Environment
- Assisted Lab: Gathering Intelligence
- Assisted Lab: Performing Social Engineering using SET
- Assisted Lab: Discovering Information using Nmap
- Assisted Lab: Performing Vulnerability Scans and Analysis
- Assisted Lab: Penetrating an Internal Network
- Assisted Lab: Exploiting Web Authentication
- Assisted Lab: Exploiting Weaknesses in a Website
- Assisted Lab: Exploiting Weaknesses in a Database
- Assisted Lab: Using SQL Injection
- Assisted Lab: Performing an AitM Attack
- Assisted Lab: Performing Password Attacks
- Assisted Lab: Using Reverse and Bind Shells
- Assisted Lab: Performing Post-Exploitation Activities
- Assisted Lab: Establishing Persistence
- Assisted Lab: Performing Lateral Movement