Course

CompTIA PenTest+

Self-paced

$2,995 Enroll

Full course description

Ready to get started?

Click here to schedule an appointment with an enrollment advisor

 

 

 

Online Instructor-led Course Schedule: Eight weeks part-time | 10-12 hours of self-paced study per week.

 

Advanced Level: We recommend having earned the CompTIA Security+ certification and two years of work experience in roles such as IT Administration, Security Operations, or Systems Administration. A solid foundation in core security concepts is essential before moving into penetration testing.

What You’ll Learn: The CompTIA PenTest+ certification course provides students with the practical, hands-on skills needed to plan, conduct, and report on penetration testing engagements. You will learn how to assess an organization’s security posture through reconnaissance, vulnerability scanning, and exploitation across networks, applications, cloud, wireless, and IoT environments. By becoming PenTest+ certified, you will gain the expertise to simulate real-world attacks, uncover security weaknesses, recommend remediation strategies, and effectively communicate findings to both technical and executive stakeholders. Employers will recognize your ability to contribute directly to red team operations, offensive security testing, and vulnerability management programs.

 

Careers you can land with a CompTIA Security+ certification: Cloud Penetration Tester | Network Penetration Tester | Web Application Penetration Tester | Vulnerability Assessment Analyst | Security Operations Specialist | Red Team Specialist | Security Architect

 

Download Course Brochure

 

Certification: CompTIA PenTest+

 

What’s included:

  • Hands-on penetration testing labs, tools, and curriculum directly from CompTIA

  • On-demand office hours & full-time access to an AI-powered tutor

  • Certification exam voucher

Course modules will cover:

Weeks 1–2:

  • Planning and Scoping a Penetration Test Engagement

  • Understanding Legal and Compliance Requirements

  • Defining Rules of Engagement and Selecting Appropriate Tools

Weeks 3–4:

  • Information Gathering and Vulnerability Identification

  • Performing Reconnaissance and Enumeration

  • Analyzing Scan Results and Mapping Attack Surfaces

Weeks 5–6:

  • Exploiting Network Vulnerabilities

  • Conducting Attacks on Applications, Wireless, and Cloud Environments

  • Performing Post-Exploitation Techniques and Persistence

Weeks 7–8:

  • Reporting and Communicating Penetration Test Findings

  • Recommending Mitigation Strategies and Remediation Steps

  • Applying Best Practices for Test Closure and Lessons Learned