CompTIA®_PT, CompTIA PenTest+

Kursa ilgums, akadēmiskās stundas:40
Kursa cena, EUR (bez PVN):2500,00

Šobrīd kurss nav ieplānots. Klikšķiniet šeit, lai pieteiktos kursam. Mēs Jūs informēsim, tikko būs zināmi iespējami apmācību datumi.


Apraksts nav pieejams latviešu valodā

In this training course you will learn skills to run the most up-to-date penetration testing, and vulnerability assessment in order to determine the resiliency of the network against attacks. Course’s participants will learn also best practices required to customize assessment frameworks to effectively collaborate on and report findings, and communicate recommended strategies to improve the overall state of IT security.

Depending on your priorities, PenTest+ and CySA+ can be taken in any order but typically follows the skills learned in Security+. While CySA+ focuses on defence through incident detection and response, PenTest+ focuses on offense through penetration testing and vulnerability assessment.

Although the two courses teach opposing skills, they are dependent on one another. The most qualified cybersecurity professionals have both offensive and defensive skills. Earn the PenTest+ certification to grow your career within the CompTIA recommended cybersecurity career pathway.

Target audience:

Penetration testers, vulnerability testers, security analysts, vulnerability assessment analysts, network security operations specialists, application security vulnerability specialists.

After successful course completion participants will be able to:

  • plan for penetration testing;
  • apply the key aspects of compliance-based assessments;
  • gather and analyse information;
  • identify potential vulnerability;
  • use penetration testing tools;
  • develop strategies to decrease vulnerability;
  • report testing’s findings.


It is highly recommended to have knowledge and skills you could gain in training course CompTIA Security +

Certification exam:

CompTIA PenTest+ 

Training materials:

Logical Operations student kit.

Training domains are:

  1. Planning and Scoping – 15%
  2. Information Gathering and Vulnerability Identification – 22%
  3. Attacks and Exploits – 30%
  4. Penetration Testing Tools – 17%
  5. Reporting and Communication – 15%