Study any time, from any device.

Get CompTIA PenTest+ Certified

The CompTIA PenTest+ certification path teaches you how to successfully plan, carry out and report the results of a penetration test. You'll learn the process behind penetration testing, tools and techniques used by pentesters, legal and compliance issues and more.

15 courses  //   76 videos  //   8 hours of training

CompTIA PenTest+ training

This learning path teaches you the technical skills necessary to carry out a penetration test and prepares you to pass the PenTest+ exam. As you progress through 15 courses tied to the five PenTest+ exam objectives, you’ll learn about scoping a potential penetration test, gathering information and identifying vulnerabilities, implementing exploits and carrying out attacks, using popular pentesting tools and reporting your findings. Upon completion, you’ll be prepared to earn your PenTest+ certification and take the next step in your security career.

Learning path components

CompTIA PenTest+ Practice Exam
Practice Exam
CompTIA PenTest+ Practice Exam

CompTIA PenTest+ Practice Exam

Prepare for your PenTest+ exam and test your domain knowledge

Number of questions: 70

Introduction to PenTest+
Course
Introduction to PenTest+

Introduction to PenTest+

This course serves as an introduction to the CompTIA PenTest+ certification.

2 videos
9 minutes of training

Planning for an Engagement
Course
Planning for an Engagement

Planning for an Engagement

Review the art of planning for a pentesting engagement with five videos on methodology, scoping and more.

5 videos
29 minutes of training

Scoping an Engagement
Course
Scoping an Engagement

Scoping an Engagement

Learn about scoping a pentesting engagement in six videos covering assessment types, target selection and more.

6 videos
36 minutes of training

Information Gathering
Course
Information Gathering

Information Gathering

Ten videos take you through the many methods of information gathering, including scanning, enumeration, cryptographic inspection and eavesdropping. Includes demonstrations.

10 videos
64 minutes of training

Vulnerability Scanning
Course
Vulnerability Scanning

Vulnerability Scanning

Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.

4 videos
25 minutes of training

Preparing for Exploitation
Course
Preparing for Exploitation

Preparing for Exploitation

Three videos help you prepare for exploitation with an in-depth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.

3 videos
19 minutes of training

Social Engineering and Physical Attacks
Course
Social Engineering and Physical Attacks

Social Engineering and Physical Attacks

Social engineering takes center stage in this four-video course covering social engineering attack methods, motivation factors and physical security attacks.

4 videos
26 minutes of training

Exploiting Network and Application Vulnerabilities
Course
Exploiting Network and Application Vulnerabilities

Exploiting Network and Application Vulnerabilities

Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.

4 videos
48 minutes of training

Exploiting Host-based Vulnerabilities
Course
Exploiting Host-based Vulnerabilities

Exploiting Host-based Vulnerabilities

Learn about host-based vulnerabilities in this five-video course covering privilege escalation and escalation techniques.

5 videos
29 minutes of training

Post-exploitation Activities
Course
Post-exploitation Activities

Post-exploitation Activities

Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.

4 videos
30 minutes of training

Using Nmap for Pentesting
Course
Using Nmap for Pentesting

Using Nmap for Pentesting

Get to grips with the power of Nmap in this three-video course on using Nmap for pentesting.

3 videos
25 minutes of training

Use Cases of Pentesting Tools
Course
Use Cases of Pentesting Tools

Use Cases of Pentesting Tools

Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.

13 videos
42 minutes of training

Basic Script Analysis
Course
Basic Script Analysis

Basic Script Analysis

Brush up your knowledge of script analysis with six videos on the basics in Bash, Ruby, Python and more.

6 videos
41 minutes of training

Reporting and Communication
Course
Reporting and Communication

Reporting and Communication

Make sure that critical findings reach the client with the help of this five-video course on reporting and communication.

5 videos
30 minutes of training

PenTest+ Conclusion
Course
PenTest+ Conclusion

PenTest+ Conclusion

Wrap up your survey of pentesting with a tutorial on setting up your home pentesting lab.

2 videos
11 minutes of training

 

What you’ll learn.

The CompTIA PenTest+ certification exam includes five primary objectives:

  • Planning and scoping
  • Information gathering and vulnerability identification
  • Attacks and exploits
  • Penetration testing tools
  • Reporting and communication

Who is this for?

Three to four years of hands-on experience performing penetration tests, vulnerability assessments and vulnerability management is recommended. This certification path is designed for:

  • Penetration testers
  • Security analysts
  • Cybersecurity consultants
  • Anyone looking to improve their pentesting skills and get certified!

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer