Overview

What You Get
- CompTIA PenTest+ Exam Voucher
- 35 hours of high-quality classroom or live online training
- Hands-on Labs
- CompTIA PenTest+ Accredited Instructor
- More than 180 end of chapter drill questions with answer keys
- Online access to CompTIA PenTest+ Learning Resources
- Official CompTIA PenTest+ Digital Courseware
- Certificate of Attendance
- Unlimited course refresher for 1 year (Note: exams are not included)
Course Benefits
- Prove Your Expertise: Validate your ability to handle intermediate-level duties as a Penetration Tester or Security Consultant.
- Master the Full Lifecycle: Gain hands-on skills in scoping, compliance, vulnerability scanning, exploits, and professional remediation reporting.
- Global Recognition: Earn an internationally recognized, vendor-neutral credential that proves your competency in ethical hacking anywhere in the world.
- Bridge the Skills Gap: As global security threats rise, organizations are desperate for trained staff. This certification makes you the solution to their "lack of trained IT security" problem.
- Career Advancement: Qualify for high-paying roles by meeting the exact penetration testing and vulnerability assessment needs of modern employers.
You Will Learn How To
Our CompTIA PenTest+ Certification Training in the Philippines focuses on the practical skills used by real-world ethical hackers. You will master how to:
- Master Modern Hacking Trends: Go beyond basic testing. You'll learn to handle all stages of a cyberattack using both knowledge and hands-on performance tasks.
- Use the Latest Techniques: Gain expertise in cutting-edge areas like Artificial Intelligence (AI), lateral movement, and advanced vulnerability management.
- Secure All Attack Surfaces: Practice hacking (and defending) the most common targets: Cloud & Hybrid Networks, Web Apps & APIs, IoT Devices.
- Plan & Scope Projects: Learn how to set the rules for a penetration test and gather intelligence (Reconnaissance) effectively.
- Stay Legal & Compliant: Perform attacks that follow strict legal and professional standards.
- Use & Customize Tools: Learn to use, pick, and modify the right tools and tactics for every phase of a test.
- Report & Recommend: Turn your technical findings into a professional report with clear steps for stakeholders to fix security gaps.
Who Should Attend
- Aspiring Penetration Testers: IT professionals ready to launch a career in offensive security.
- Security Analysts & Admins: Experts who want to get better at finding and fixing system weaknesses.
- Network Engineers & Admins: Professionals looking to expand their skills into securing complex IT networks.
- Ethical Hackers: Individuals conducting vulnerability assessments who want an industry-recognized certification.
- Cybersecurity Specialists: Anyone aiming to validate their expertise in modern attack surfaces like Cloud and IoT.
Course Prerequisite
About the Exam
- Number of questions: Maximum of 90
- Type of questions: Multiple choice and performance based
- Length of test: 165 minutes
- Passing score: 750 (on a scale of 100-900)
Course Outline
Engagement Management
- Pre-Engagement Activities: Regulations, standards (PCI DSS, GDPR), and privacy laws.
- Legal & Ethical Considerations: Authorization letters (Permission to Attack), SOW (Statement of Work), MSA, and NDAs.
- Scoping: Defining targets (CIDR ranges, APIs, Domains), timeframes, and exclusion lists.
- Communication: Escalation paths for critical findings and stakeholder alignment.
Reconnaissance & Enumeration
- Information Gathering: Active vs. Passive reconnaissance (OSINT, social media, job boards)
- Enumeration: DNS lookups, reverse DNS, and identifying users, hosts, and services.
- Scanning Tools: Mastery of Nmap, Wireshark, Shodan, and Recon-ng.
- Scripting: Modifying Bash, Python, or PowerShell scripts specifically for discovery tasks.
Scanning & Identifying Vulnerabilities
- Vulnerability Discovery: Container scans, sidecar scans, and Infrastructure as Code (IaC) analysis.
- Application Scanning: DAST (Dynamic), SAST (Static), and IAST (Interactive) testing.
- Analysis: Validating findings to identify false positives and false negatives.
Attacks & Exploits
- Network & Enterprise Attacks: VLAN hopping, NAC bypass, and Link-Local Multicast Name Resolution (LLMNR) poisoning.
- Authentication Attacks: Brute-force, Pass-the-Hash (PtH), Pass-the-Ticket, and Kerberos attacks.
- Web-Based & API Attacks: SQL injection, Cross-Site Scripting (XSS), CSRF, and SSRF.
- Specialized Attacks:
Cloud: IAM misconfigurations, metadata service attacks, and container escapes.
Mobile & IoT: Jailbreaking, permission abuse, and Zigbee/Bluetooth vulnerabilities.
AI Attacks: Prompt injection and model manipulation.
Post-Exploitation Tasks
- Lateral Movement: Pivoting and establishing persistence within a network.
- Staging & Exfiltration: Hiding data (Steganography) and automated data removal.
- Cleanup: Removing backdoors and restoring system configurations to their original state.
Reporting & Recommendations
- Report Components: Executive summaries, methodology descriptions, and detailed technical findings
- Remediation: Providing technical (hardening), administrative (RBAC), and physical control recommendations.
