Skill assessment
Skill assessment | 20 questions
See how your PenTest+ skills stack up against other professionals in your field.
PenTest+ Custom Practice Exam
Custom practice exam | 71 questions
Prepare for your PenTest+ exam and test your domain knowledge.
Introduction to PenTest+
Course | 8 minutes
This course serves as an introduction to the CompTIA PenTest+ certification.
Planning for an Engagement
Course | 29 minutes
Review the art of planning for a pentesting engagement with five videos on methodology, scoping and more.
Scoping an Engagement
Course | 35 minutes
Learn about scoping a pentesting engagement in six videos covering assessment types, target selection and more.
Information Gathering
Course | 1 hour 4 minutes
Ten videos take you through the many methods of information gathering, including scanning, enumeration, cryptographic inspection and eavesdropping. Includes demonstrations.
Vulnerability Scanning
Course | 24 minutes
Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.
Preparing for Exploitation
Course | 20 minutes
Three videos help you prepare for exploitation with an indepth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.
Social Engineering and Physical Attacks
Course | 26 minutes
Social engineering takes center stage in this four-video course covering social engineering attack methods, motivation factors and physical security attacks
Exploiting Network and Application Vulnerabilities
Course | 47 minutes
Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.
Exploiting Host-based Vulnerabilities
Course | 28 minutes
Learn about host-based vulnerabilities in this five-video course covering privilege escalation and escalation techniques.
Post-exploitation Activities
Course | 29 minutes
Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.
Using Nmap for Pentesting
Course | 24 minutes
Get to grips with the power of Nmap in this three-video course on using Nmap for pentesting.
Use Cases of Pentesting Tools
Course | 41 minutes
Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.
Basic Script Analysis
Course | 40 minutes
Brush up your knowledge of script analysis with six videos on the basics in Bash, Ruby, Python and more.
Reporting and Communication
Course | 30 minutes
Make sure that critical findings reach the client with the help of this five-video course on reporting and communication.
PenTest+ Conclusion
Course | 11 minutes
Wrap up your survey of pentesting with a tutorial on setting up your home pentesting lab.
Skill assessment
Skill assessment | 20 questions
See how your PenTest+ skills stack up against other professionals in your field.
PenTest+ Custom Practice Exam
Custom practice exam | 71 questions
Prepare for your PenTest+ exam and test your domain knowledge.
Introduction to PenTest+
Course | 8 minutes
This course serves as an introduction to the CompTIA PenTest+ certification.
Planning for an Engagement
Course | 29 minutes
Review the art of planning for a pentesting engagement with five videos on methodology, scoping and more.
Scoping an Engagement
Course | 35 minutes
Learn about scoping a pentesting engagement in six videos covering assessment types, target selection and more.
Information Gathering
Course | 1 hour 4 minutes
Ten videos take you through the many methods of information gathering, including scanning, enumeration, cryptographic inspection and eavesdropping. Includes demonstrations.
Vulnerability Scanning
Course | 24 minutes
Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.
Preparing for Exploitation
Course | 20 minutes
Three videos help you prepare for exploitation with an indepth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.
Social Engineering and Physical Attacks
Course | 26 minutes
Social engineering takes center stage in this four-video course covering social engineering attack methods, motivation factors and physical security attacks
Exploiting Network and Application Vulnerabilities
Course | 47 minutes
Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.
Exploiting Host-based Vulnerabilities
Course | 28 minutes
Learn about host-based vulnerabilities in this five-video course covering privilege escalation and escalation techniques.
Post-exploitation Activities
Course | 29 minutes
Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.
Using Nmap for Pentesting
Course | 24 minutes
Get to grips with the power of Nmap in this three-video course on using Nmap for pentesting.
Use Cases of Pentesting Tools
Course | 41 minutes
Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.
Basic Script Analysis
Course | 40 minutes
Brush up your knowledge of script analysis with six videos on the basics in Bash, Ruby, Python and more.
Reporting and Communication
Course | 30 minutes
Make sure that critical findings reach the client with the help of this five-video course on reporting and communication.
PenTest+ Conclusion
Course | 11 minutes
Wrap up your survey of pentesting with a tutorial on setting up your home pentesting lab.