Overview

CompTIA A+ Certification Training Philippines

 

What You Get

  • CompTIA PenTest+ Exam Voucher
  • 35 hours of high-quality classroom or live online training
  • Hands-on Labs
  • CompTIA PenTest+ Accredited Instructor
  • More than 180 end of chapter drill questions with answer keys
  • Online access to CompTIA PenTest+ Learning Resources
  • Official CompTIA PenTest+ Digital Courseware
  • Certificate of Attendance
  • Unlimited course refresher for 1 year (Note: exams are not included)

Course Benefits

Earning your CompTIA PenTest+ Certification Training in the Philippines offers more than just a certificate—it builds a career. Here is how it helps you:

  • Prove Your Expertise: Validate your ability to handle intermediate-level duties as a Penetration Tester or Security Consultant.
  • Master the Full Lifecycle: Gain hands-on skills in scoping, compliance, vulnerability scanning, exploits, and professional remediation reporting.
  • Global Recognition: Earn an internationally recognized, vendor-neutral credential that proves your competency in ethical hacking anywhere in the world.
  • Bridge the Skills Gap: As global security threats rise, organizations are desperate for trained staff. This certification makes you the solution to their "lack of trained IT security" problem.
  • Career Advancement: Qualify for high-paying roles by meeting the exact penetration testing and vulnerability assessment needs of modern employers.

You Will Learn How To

Our CompTIA PenTest+ Certification Training in the Philippines focuses on the practical skills used by real-world ethical hackers. You will master how to:

  • Master Modern Hacking Trends: Go beyond basic testing. You'll learn to handle all stages of a cyberattack using both knowledge and hands-on performance tasks.
  • Use the Latest Techniques: Gain expertise in cutting-edge areas like Artificial Intelligence (AI), lateral movement, and advanced vulnerability management.
  • Secure All Attack Surfaces: Practice hacking (and defending) the most common targets: Cloud & Hybrid Networks, Web Apps & APIs, IoT Devices.
  • Plan & Scope Projects: Learn how to set the rules for a penetration test and gather intelligence (Reconnaissance) effectively.
  • Stay Legal & Compliant: Perform attacks that follow strict legal and professional standards.
  • Use & Customize Tools: Learn to use, pick, and modify the right tools and tactics for every phase of a test.
  • Report & Recommend: Turn your technical findings into a professional report with clear steps for stakeholders to fix security gaps.

Who Should Attend

This CompTIA PenTest+ Certification Training in the Philippines is designed for professionals who want to master ethical hacking and vulnerability management. It is ideal for:

  • Aspiring Penetration Testers: IT professionals ready to launch a career in offensive security.
  • Security Analysts & Admins: Experts who want to get better at finding and fixing system weaknesses.
  • Network Engineers & Admins: Professionals looking to expand their skills into securing complex IT networks.
  • Ethical Hackers: Individuals conducting vulnerability assessments who want an industry-recognized certification.
  • Cybersecurity Specialists: Anyone aiming to validate their expertise in modern attack surfaces like Cloud and IoT.

Course Prerequisite

Recommended experience: 3–4 years in a penetration tester job role.

About the Exam

  • Number of questions: Maximum of 90
  • Type of questions: Multiple choice and performance based 
  • Length of test: 165 minutes
  • Passing score: 750 (on a scale of 100-900)

Course Outline

Engagement Management

  • Pre-Engagement Activities: Regulations, standards (PCI DSS, GDPR), and privacy laws.
  • Legal & Ethical Considerations: Authorization letters (Permission to Attack), SOW (Statement of Work), MSA, and NDAs.
  • Scoping: Defining targets (CIDR ranges, APIs, Domains), timeframes, and exclusion lists.
  • Communication: Escalation paths for critical findings and stakeholder alignment.

Reconnaissance & Enumeration

  • Information Gathering: Active vs. Passive reconnaissance (OSINT, social media, job boards)
  • Enumeration: DNS lookups, reverse DNS, and identifying users, hosts, and services.
  • Scanning Tools: Mastery of Nmap, Wireshark, Shodan, and Recon-ng.
  • Scripting: Modifying Bash, Python, or PowerShell scripts specifically for discovery tasks.

Scanning & Identifying Vulnerabilities

  • Vulnerability Discovery: Container scans, sidecar scans, and Infrastructure as Code (IaC) analysis.
  • Application Scanning: DAST (Dynamic), SAST (Static), and IAST (Interactive) testing.
  • Analysis: Validating findings to identify false positives and false negatives.

Attacks & Exploits

  • Network & Enterprise Attacks: VLAN hopping, NAC bypass, and Link-Local Multicast Name Resolution (LLMNR) poisoning.
  • Authentication Attacks: Brute-force, Pass-the-Hash (PtH), Pass-the-Ticket, and Kerberos attacks.
  • Web-Based & API Attacks: SQL injection, Cross-Site Scripting (XSS), CSRF, and SSRF.
  • Specialized Attacks:
    Cloud: IAM misconfigurations, metadata service attacks, and container escapes.
    Mobile & IoT: Jailbreaking, permission abuse, and Zigbee/Bluetooth vulnerabilities.
    AI Attacks: Prompt injection and model manipulation.

Post-Exploitation Tasks

  • Lateral Movement: Pivoting and establishing persistence within a network.
  • Staging & Exfiltration: Hiding data (Steganography) and automated data removal.
  • Cleanup: Removing backdoors and restoring system configurations to their original state.

Reporting & Recommendations

  • Report Components: Executive summaries, methodology descriptions, and detailed technical findings
  • Remediation: Providing technical (hardening), administrative (RBAC), and physical control recommendations.