• Overview

    About On-Demand Learning

    TechSherpas 365’s On-Demand courses provide you with access to official courseware materials and hands-on labs, empowering you to learn at your own pace. On-Demand allows you to design your training around your schedule, budget, and individual learning needs.

    On-Demand Learning is a perfect solution for students who are unable to attend traditional instructor-led training due to schedule constraints. You receive the same materials and labs as an instructor-led course, with the added convenience of flexible scheduling and a lower price tag.

    This On-Demand Course Includes:

    • Official Courseware License with Lifetime Access (and automatic version updates)
    • Access to Hands-on Labs
    • Access to 3 hours of Instructor Time (upon request):
      • One-on-one live instructor time geared towards your specific needs
      • Scheduled in 1-hour increments

    CompTIA PenTest+ is a vendor-neutral cybersecurity certification that verifies competency in the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results. Key job roles include Penetration and/or Vulnerability Tester, Security Analyst (II), Vulnerability Assessment Analyst, Network Security Operations and Application Security Vulnerability.

    About the exam

    This exam is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course.


    Lesson 1: Planning and Scoping Penetration Tests
    Topic A: Introduction to Penetration Testing Concepts
    Topic B: Plan a Pen Test Engagement
    Topic C: Scope and Negotiate a Pen Test Engagement
    Topic D: Prepare for a Pen Test Engagement

    Lesson 2: Conducting Passive Reconnaissance
    Topic A: Gather Background Information
    Topic B: Prepare Background Findings for Next Steps

    Lesson 3: Performing Non-Technical Tests
    Topic A: Perform Social Engineering Tests
    Topic B: Perform Physical Security Tests on Facilities

    Lesson 4: Conducting Active Reconnaissance
    Topic A: Scan Networks
    Topic B: Enumerate Targets
    Topic C: Scan for Vulnerabilities
    Topic D: Analyze Basic Scripts

    Lesson 5: Analyzing Vulnerabilities
    Topic A: Analyze Vulnerability Scan Results
    Topic B: Leverage Information to Prepare for Exploitation

    Lesson 6: Penetrating Networks
    Topic A: Exploit Network-Based Vulnerabilities
    Topic B: Exploit Wireless and RF-Based Vulnerabilities
    Topic C: Exploit Specialized Systems

    Lesson 7: Exploiting Host-Based Vulnerabilities
    Topic A: Exploit Windows-Based Vulnerabilities
    Topic B: Exploit *Nix-Based Vulnerabilities

    Lesson 8: Testing Applications
    Topic A: Exploit Web Application Vulnerabilities
    Topic B: Test Source Code and Compiled Apps

    Lesson 9: Completing Post-Exploit Tasks
    Topic A: Use Lateral Movement Techniques
    Topic B: Use Persistence Techniques
    Topic C: Use Anti-Forensics Techniques

    Lesson 10: Analyzing and Reporting Pen Test Results
    Topic A: Analyze Pen Test Data
    Topic B: Develop Recommendations for Mitigation Strategies
    Topic C: Write and Handle Reports
    Topic D: Conduct Post-Report-Delivery Activities