Overview Welcome to the CompTIA PenTest+ (Ethical Hacking) course, your gateway to mastering the essential skills needed to evaluate and …
( Reviews )
2 Students
Welcome to the CompTIA PenTest+ (Ethical Hacking) course, your gateway to mastering the essential skills needed to evaluate and enhance network security through ethical hacking techniques. This course is meticulously crafted to provide comprehensive training in penetration testing methodologies, preparing you to identify and mitigate vulnerabilities within organizational networks.
Ethical hacking, also known as penetration testing, plays a critical role in cybersecurity by simulating real-world attacks to assess the security posture of systems and networks. Throughout this course, you will delve into the fundamental principles and practices of ethical hacking, starting with the planning and scoping stages of a penetration test. You’ll learn to effectively gather information, analyze potential attack surfaces, and develop a strategy to uncover vulnerabilities.
Hands-on labs and practical exercises will immerse you in the tools and techniques used by penetration testers. You will gain proficiency in tools like Nmap for network mapping and reconnaissance, Metasploit for exploiting vulnerabilities, and Wireshark for packet analysis. These skills are essential for understanding how attackers exploit weaknesses and for devising robust defense strategies.
The curriculum covers a wide array of topics, including vulnerability assessment, exploitation techniques, post-exploitation strategies, and reporting. You will also explore legal and ethical considerations, ensuring that your penetration testing activities adhere to industry standards and regulations.
By the end of the course, you will be well-prepared to sit for the CompTIA PenTest+ certification exam. This globally recognized certification validates your ability to perform penetration testing and vulnerability assessment tasks, making you a valuable asset in the cybersecurity field.
Whether you’re a cybersecurity professional looking to advance your career or an IT professional aiming to specialize in ethical hacking, this course equips you with the practical skills and theoretical knowledge necessary to succeed. Join us on this journey to master ethical hacking and contribute to the security of organizations worldwide.
Enroll today and take the first step toward becoming a certified ethical hacker with CompTIA PenTest+.
On Completion of this online course, you’ll acquire:
The CompTIA PenTest+ (Ethical Hacking) course provides comprehensive training in the field of penetration testing, a crucial aspect of ethical hacking. You will explore the methodologies and tools used by penetration testers to assess network security and identify vulnerabilities. Through a blend of theoretical knowledge and practical labs, you’ll develop proficiency in conducting penetration tests across various environments, from networks to applications. Topics covered include information gathering, vulnerability assessment, exploitation techniques, and post-exploitation analysis. The course emphasizes the importance of ethical conduct and compliance with legal frameworks while performing penetration testing activities.
By participating in hands-on labs and simulations, you’ll gain practical experience with industry-standard tools such as Nmap for network scanning, Metasploit for exploiting vulnerabilities, and Wireshark for packet analysis. These skills are essential for cybersecurity professionals aiming to secure organizational networks and systems proactively.
Upon completion of the course, you’ll be well-prepared to sit for the CompTIA PenTest+ certification exam, validating your expertise in ethical hacking and penetration testing.
This course is ideal for cybersecurity professionals, IT professionals, and anyone interested in mastering the art of ethical hacking and penetration testing. It’s suitable for individuals looking to advance their careers in cybersecurity or validate their skills with a recognized certification.
Access to a computer with internet connectivity and a desire to learn and succeed in your home-based business venture. No prior experience or qualifications are necessary.
Upon successful completion of the CompTIA PenTest+ (Ethical Hacking) course, learners can obtain both a PDF certificate and a Hard copy certificate for completely FREE. The Hard copy certificate is available for a nominal fee of £3.99, which covers the delivery charge within the United Kingdom. Additional delivery charges may apply for orders outside the United Kingdom.
An outstanding online course with clear explanations and practical examples. I could study at my own pace and still feel fully supported throughout. It’s truly boosted my confidence and career prospects
The course was well-structured, engaging, and easy to follow. The flexibility made it perfect alongside my full-time job. I’ve gained valuable, real-world skills that I can apply immediately.
Excellent learning experience from start to finish. The content was professional, up-to-date, and highly relevant. I would highly recommend it to anyone looking to upskill online.
| Section 01: Introduction | |||
| Introduction | 00:09:00 | ||
| Section 02: Planning and Scoping | |||
| Planning a Pen Test | 00:09:00 | ||
| Rules of Engagement | 00:11:00 | ||
| Resources and Budget | 00:07:00 | ||
| Impact and Constraints | 00:05:00 | ||
| Support Resources | 00:13:00 | ||
| Legal Groundwork | 00:12:00 | ||
| Scope Considerations | 00:11:00 | ||
| Lab Environment Setup | 00:23:00 | ||
| Project Strategy and Risk | 00:09:00 | ||
| Scope Vulnerabilities | 00:14:00 | ||
| Compliance-Based Assessments | 00:05:00 | ||
| Section 03: Surveying the Target | |||
| Scanning and Enumeration | 00:05:00 | ||
| Scanning Demo | 00:11:00 | ||
| Packet Investigation | 00:08:00 | ||
| Packet Inspection Demo | 00:06:00 | ||
| Application and Open-Source Resources | 00:12:00 | ||
| Vulnerability Scanning | 00:09:00 | ||
| Vulnerability Scanning Demo | 00:17:00 | ||
| Target Considerations | 00:16:00 | ||
| Nmap Timing and Performance Options | 00:07:00 | ||
| Prioritization of Vulnerabilities | 00:09:00 | ||
| Common Attack Techniques | 00:12:00 | ||
| Credential Attacks | 00:15:00 | ||
| Weaknesses in Specialized Systems | 00:18:00 | ||
| Section 04: Select Your Attack Vector | |||
| Remote Social Engineering | 00:07:00 | ||
| Spear Phishing Demo | 00:10:00 | ||
| In-Person Social Engineering | 00:12:00 | ||
| Network-Based Exploits | 00:07:00 | ||
| FTP Exploit Demo | 00:08:00 | ||
| Man-in-the-middle Exploits | 00:07:00 | ||
| Wireless Exploits | 00:14:00 | ||
| Application Exploits, Part 1 | 00:06:00 | ||
| SQL Injection Demo | 00:09:00 | ||
| Application Exploits, Part 2 | 00:08:00 | ||
| Application Exploits, Part 3 | 00:09:00 | ||
| Cross-Site Scripting Demo | 00:07:00 | ||
| Code Vulnerabilities | 00:17:00 | ||
| Local Host Vulnerabilities | 00:05:00 | ||
| Privilege Escalation (Linux) | 00:10:00 | ||
| Privilege Escalation (Windows) | 00:06:00 | ||
| Misc. Privilege Escalation | 00:08:00 | ||
| Misc. Local Host Vulnerabilities | 00:08:00 | ||
| Physical Security | 00:11:00 | ||
| Post-Exploitation Techniques | 00:11:00 | ||
| Persistence and Stealth | 00:11:00 | ||
| Section 05: Selecting Pen Testing Tools | |||
| Nmap Scoping & Output Options | 00:21:00 | ||
| Pen Testing Toolbox | 00:07:00 | ||
| Using Kali Linux | 00:06:00 | ||
| Scanners & Credential Tools | 00:10:00 | ||
| Code-Cracking Tools | 00:05:00 | ||
| Open-Source Research Tools | 00:07:00 | ||
| Wireless and Web Pen Testing Tools | 00:11:00 | ||
| Remote Access Tools | 00:06:00 | ||
| Analyzers and Mobile Pen Testing Tools | 00:03:00 | ||
| Other Pen Testing Tools | 00:05:00 | ||
| Using Scripting in Pen Testing | 00:13:00 | ||
| Bash Scripting Basics | 00:15:00 | ||
| Bash Scripting Techniques | 00:10:00 | ||
| PowerShell Scripts | 00:04:00 | ||
| Ruby Scripts | 00:07:00 | ||
| Python Scripts | 00:06:00 | ||
| Scripting Languages Comparison | 00:11:00 | ||
| Section 06: Reporting and Communication | |||
| Writing Reports | 00:16:00 | ||
| Post-Report Activities | 00:06:00 | ||
| Mitigation Strategies | 00:05:00 | ||
| Communication | 00:10:00 | ||
Yes, Discover Training provides accredited and CPD-certified courses, ensuring learners receive recognised qualifications that support career progression and professional compliance.
Anyone can enrol, including students, professionals, job seekers, career changers, and organisations. Most courses do not require previous experience, making them accessible to learners at all levels.
Discover Training offers courses across multiple sectors, including business, health and safety, compliance, leadership, IT, personal development, and professional skills training.
You will have 14 days to revoke your Course purchase from your purchase date. Regrettably, refunds are not allowed after your purchase have been approved, and materials have been posted to the student’s dashboard or accessed.
Yes, learners receive a downloadable digital certificate upon successful completion, suitable for CPD records, CVs, and professional portfolios.
14-Day Money-Back Guarantee
COPYRIGHT © 2026 Discover Training