logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

CompTIA PenTest+ Certification Prep

SS Course: GK100213

Course Overview

TOP

Pentest+ Certification Prep is designed to help learners confidently prepare for the CompTIA PenTest+ (PT0-003) exam, which validates the skills required to perform penetration testing and vulnerability management in a variety of IT environments. This course emphasizes hands-on, performance-based learning, guiding students through the full penetration testing process from planning and scoping to exploitation and reporting. It s ideal for cybersecurity professionals who want to deepen their offensive security expertise and earn a globally recognized credential.

Students will explore the five domains covered in the PT0-003 exam: Planning and Scoping, Information Gathering and Vulnerability Identification, Attacks and Exploits, Reporting and Communication, and Tools and Code Analysis. Through practical labs, real-world scenarios, and exam-focused instruction, learners will gain experience using industry-standard tools and techniques to identify and exploit vulnerabilities, analyze systems, and communicate findings effectively. The course also reinforces ethical and legal considerations, ensuring students are prepared to operate responsibly in professional environments.

Whether you're pursuing a career as a penetration tester, vulnerability analyst, or security consultant, this course provides the structure and support needed to succeed on the PT0-003 exam and beyond. With updated content reflecting the latest threats and technologies, learners will be equipped to meet the demands of today s cybersecurity landscape.

                                                                  

Scheduled Classes

TOP
03/16/26 - GVT - Virtual Classroom - Virtual Instructor-Led
05/11/26 - GVT - Virtual Classroom - Virtual Instructor-Led
07/27/26 - GVT - Virtual Classroom - Virtual Instructor-Led
09/14/26 - GVT - Virtual Classroom - Virtual Instructor-Led
11/09/26 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP
  • Lesson 1: Scoping Organizational/Customer Requirements
  • Lesson 2: Defining the Rules of Engagement
  • Lesson 3: Footprinting and Gathering Intelligence
  • Lesson 4: Evaluating Human and Physical Vulnerabilities
  • Lesson 5: Preparing the Vulnerability Scan
  • Lesson 6: Scanning Logical Vulnerabilities
  • Lesson 7: Analyzing Scanning Results
  • Lesson 8: Avoiding Detection and Covering Tracks
  • Lesson 9: Exploiting the LAN and Cloud
  • Lesson 10: Testing Wireless Networks
  • Lesson 11: Targeting Mobile Devices
  • Lesson 12: Attacking Specialized Systems
  • Lesson 13: Web Application-Based Attacks
  • Lesson 14: Performing System Hacking
  • Lesson 15: Scripting and Software Development
  • Lesson 16: Leveraging the Attack: Pivot and Penetrate
  • Lesson 17: Communicating During the PenTesting Process
  • Lesson 18: Summarizing Report Components
  • Lesson 19: Recommending Remediation
  • Lesson 20: Performing Post-Report Delivery Activities

    Prerequisites

    TOP

    To ensure your success in this course, you should have:

    • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
    • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

      Who Should Attend

      TOP

      This course is best suited for IT and cybersecurity professionals who have foundational knowledge of network and system security and are looking to advance into offensive security roles. Learners are typically hands-on, analytical, and eager to develop practical skills in penetration testing, vulnerability assessment, and ethical hacking to enhance their career prospects or prepare for more advanced certifications.

      Relevant Job Roles:

      • Penetration Tester
      • Vulnerability Analyst
      • Security Consultant
      • Red Team Member
      • SOC Analyst (with offensive security focus)
      • Cybersecurity Specialist
      • Network Security Engineer
      • Ethical Hacker