Scroll to top button

CompTIA PenTest+ PT0-001

ISBN : 9781644590843

Accomplish your CompTIA PenTest+ certification by passing the PT0-001 exam with the CompTIA PenTest+ PT0-001 course and lab. The lab is a simulator that provides a virtual environment for users to explore and learn. The course and lab cover the PT0-001 exam objectives and knowledge to Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks and perform post-exploitation techniques, and many more.

CompTIA PenTest+ certification validates that the successful candidate has the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results. The CompTIA PenTest+ PT0-001 certification explains the importance of planning and key aspects of compliance-based assessments.

Lessons
Lessons
13+
Quizzes
271+
Flashcards
75+
Glossary of terms
75+
TestPrep
Pre Assessment Questions
80+
Post Assessment Questions
80+
Lab
Performance lab
Learn the real world skills using LiveLab.
54+
LiveLab (Add-on Component)
Exam related FAQs
What are the prerequisites for this exam? Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
What is the exam registration fee? USD 349
Where do I take the exam?

CompTIA

What is the format of the exam? Performance-based and multiple choice
How many questions are asked in the exam? The exam contains Maximum of 85 questions.
What is the duration of the exam? 165 minutes
What is the passing score? 750

(on a scale of 0-900)

What is the exam's retake policy?

In the event that you fail your first (1st) attempt to pass any CompTIA certification examination, CompTIA does not require any waiting period between the first (1st) and second (2nd) attempt to pass such examination. However, before your third (3rd) attempt or any subsequent attempt to pass such examination, you shall be required to wait for a period of at least fourteen (14) calendar days from the date of your last attempt to pass such examination.

  • CompTIA beta examinations may only be taken one (1) time by each candidate.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer any free re-tests or discounts on retakes.
  • If a Candidate has passed an exam (or multiple exams) and achieved a certification, he/she cannot take the exam again, using the same exam code, without prior consent from CompTIA.
  • A test found to be in violation of the retake policy will be invalidated and the candidate may be subject to a suspension period. Repeat violators will be permanently banned from participation in the CompTIA Certification Program.
What is the validity of the certification? TBD - Usually three years after launch.
Where can I find more information about this exam? To know more about the PT0-001, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Penetration Tester
  • Security Analyst (II)
  • Vulnerability Tester
  • Network Security Operations
  • Application Security Vulnerability
  • Vulnerability Assessment Analyst
  • CompTIA
  • The PenTest+ Exam
  • What Does This Course Cover?
  • CompTIA PenTest+ Certification Exam Objectives
  • What Is Penetration Testing?
  • Reasons for Penetration Testing
  • Who Performs Penetration Tests?
  • The CompTIA Penetration Testing Process
  • The Cyber Kill Chain
  • Tools of the Trade
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Scoping and Planning Engagements
  • Key Legal Concepts for Penetration Tests
  • Understanding Compliance-Based Assessments
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Footprinting and Enumeration
  • Active Reconnaissance and Enumeration
  • Information Gathering and Defenses
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Software Security Testing
  • Developing a Remediation Workflow
  • Overcoming Barriers to Vulnerability Scanning
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Exploits and Attacks
  • Exploitation Toolkits
  • Exploit Specifics
  • Leveraging Exploits
  • Persistence and Evasion
  • Pivoting
  • Covering Your Tracks
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Conducting Network Exploits
  • Exploiting Windows Services
  • Exploiting Common Services
  • Wireless Exploits
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Physical Facility Penetration Testing
  • Social Engineering
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Exploiting Injection Vulnerabilities
  • Exploiting Authentication Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Unsecure Coding Practices
  • Application Testing Tools
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Attacking Hosts
  • Remote Access
  • Attacking Virtual Machines and Containers
  • Physical Device Security
  • Attacking Mobile Devices
  • Credential Attacks
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Scripting and Penetration Testing
  • Variables, Arrays, and Substitutions
  • Comparison Operations
  • String Operations
  • Flow Control
  • Input and Output (I/O)
  • Error Handling
  • Summary
  • Exam Essentials
  • Lab Exercises
  • The Importance of Communication
  • Recommending Mitigation Strategies
  • Writing a Penetration Testing Report
  • Wrapping Up the Engagement
  • Summary
  • Exam Essentials
  • Lab Exercises

Hands on Activities (Labs)

  • Studying SOW, MSA, and NDA
  • Examining Penetration Testing Execution Standard (PTES)
  • Examining Open Source Security Testing Methodology Manual
  • Examining NIST SP 800-115 - Technical Guide to Information Security Testing and Assessment
  • Performing Domain Enumeration
  • Performing Zone Transfer Using dig
  • Using ExifTool
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using Maltego
  • Studying the Communication Plan and the Main Elements of a Pen Test Report
  • Performing Nmap SYN Scan
  • Performing Nmap UDP Scan
  • Using Nmap for Host Enumeration
  • Using Nmap for User Enumeration
  • Using Nmap for Group Enumeration
  • Using Nmap for Web Application Enumeration
  • Using Nmap for Network Enumeration
  • Using Zenmap
  • Using Nslookup for Passive Reconnaissance
  • Examining the OWASP Web Testing Methodologies and Testing Guide
  • Using Nikto
  • Studying CVSS Exercises with the CVSS Calculator
  • Using Searchsploit
  • Using OpenVAS
  • Using meterpreter
  • Exploiting SMB
  • Using the Metasploit RDP Post-Exploitation Module
  • Using the SET Tool
  • Performing ARP Spoofing
  • Performing the Man-in-the-Middle Attack
  • Using the EternalBlue Exploit in Metasploit
  • Exploiting SNMP
  • Exploiting SMTP
  • Exploiting SQL Injection Vulnerabilities
  • Exploiting Blind SQL Injection Vulnerabilities
  • Exploiting Command Injection Vulnerabilities
  • Understanding Credential based Brute-force Attack
  • Performing Session Hijacking
  • Exploiting Local File Inclusion Vulnerabilities
  • Exploiting Remote File Inclusion Vulnerabilities
  • Exploiting the Stored (Persistent) XSS Attack
  • Exploiting the DOM-Based XSS Attack
  • Exploiting the Reflected XSS Attack
  • Exploiting the Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Using Burp and the OWASP ZAP Attack Proxy
  • Understanding the Pass-the-hash Attack
  • Understanding SUID or SGID and Unix Program
  • Understanding Local Privilege Escalation
  • Exploting SAM Database
  • Creating Reverse and Bind Shells using Netcat
  • Using Apktool to Decode and Analyze apk File
  • Using Bash for Penetration Testing
  • Using Python for Penetration Testing
  • Using PowerShell for Penetration Testing

Hands on Activities (LiveLab)

  • Studying SOW, MSA, and NDA
  • Examining Penetration Testing Execution Standard (PTES)
  • Examining Open Source Security Testing Methodology Manual
  • Examining NIST SP 800-115 - Technical Guide to Information Security Testing and Assessment
  • Performing Domain Enumeration
  • Performing Zone Transfer Using dig
  • Using ExifTool
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using Maltego
  • Studying the Communication Plan and the Main Elements of a Pen Test Report
  • Performing Nmap SYN Scan
  • Performing Nmap UDP Scan
  • Using Nmap for Host Enumeration
  • Using Nmap for User Enumeration
  • Using Nmap for Group Enumeration
  • Using Nmap for Web Application Enumeration
  • Using Nmap for Network Enumeration
  • Using Zenmap
  • Using Nslookup for Passive Reconnaissance
  • Examining the OWASP Web Testing Methodologies and Testing Guide
  • Using Nikto
  • Studying CVSS Exercises with the CVSS Calculator
  • Using Searchsploit
  • Using OpenVAS
  • Using meterpreter
  • Exploiting SMB
  • Using the Metasploit RDP Post-Exploitation Module
  • Using the SET Tool
  • Performing ARP Spoofing
  • Performing the Man-in-the-Middle Attack
  • Using the EternalBlue Exploit in Metasploit
  • Exploiting SNMP
  • Exploiting SMTP
  • Exploiting SQL Injection Vulnerabilities
  • Exploiting Blind SQL Injection Vulnerabilities
  • Exploiting Command Injection Vulnerabilities
  • Understanding Credential based Brute-force Attack
  • Performing Session Hijacking
  • Exploiting Local File Inclusion Vulnerabilities
  • Exploiting Remote File Inclusion Vulnerabilities
  • Exploiting the Stored (Persistent) XSS Attack
  • Exploiting the DOM-Based XSS Attack
  • Exploiting the Reflected XSS Attack
  • Exploiting the Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Using Burp and the OWASP ZAP Attack Proxy
  • Understanding the Pass-the-hash Attack
  • Understanding SUID or SGID and Unix Program
  • Understanding Local Privilege Escalation
  • Exploting SAM Database
  • Creating Reverse and Bind Shells using Netcat
  • Using Apktool to Decode and Analyze apk File
  • Using Bash for Penetration Testing
  • Using Python for Penetration Testing
  • Using PowerShell for Penetration Testing

Customer Testimonials

Naman Jain
excellent
The uCertify CompTIA Pen Test course from uCertify is simply one of the best I've seen. While most similar products include several question formats, uCertify has more than 50! Because of this, it is uniquely able to address workforce training needs. It is also ADA compliant, which is one of the best part of the company. The robust variety of question types addresses individual learner needs while also introducing new opportunities to assess areas that are typically very difficult to address in an online environment.
Krish K
best
Recently I had access to uCertify Penetration Testing course and was very much amazed that learning can also be so much fun, it helped me to gain the in-depth understanding for the course I really enjoyed the course, the platform provides the following features that help students prepare for to be certified: 26+ Exercise, Questions 536+, Quizzes 102+, Flashcards 349+, Glossary Terms, & 18+ Lessons. The course also contains over 31 videos that explain concepts and demonstrate how to execute certain tasks. If you want to get certified then go with uCertify.
Festus Odia
best
The uCertify online learning platform is an excellent online platform for the working professionals to learn new subjects and acquire new skills, while also getting certified.
×