Boost logo
Language
course | CompTIA Pentest+

We turn your development needs and aspirations into powerful digital solutions that drive growth

IT-1026 | CompTIA Pentest+

Course Sector : Information Technology

Duration
Date from
Date to Course Venue Course fees Book a course
5 Days2025-05-192025-05-23Dubai$4,250 Book now
5 Days2025-07-282025-08-01kuala lumpur$4,950 Book now
5 Days2025-12-152025-12-19Abu Dhabi$4,250 Book now

Course Introduction

As business organizations begin to scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organisations seeking protection, and ever more lucrative for those who possess these skills.

 


Course objective

This training course is designed to provide participants with the fundamental concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.


Course Outline | Day 01

PLANNING AND SCOPING PENETRATION TESTS

 

  • Introduction to Penetration Testing Concepts
  • Plan a Pen Test Engagement
  • Scope and Negotiate a Pen Test Engagement
  • Prepare for a Pen Test Engagement

 

 

CONDUCTING PASSIVE RECONNAISSANCE

 

  • Gather Background Information
  • Prepare Background Findings for Next Steps

Course Outline | Day 02

PERFORMING NON-TECHNICAL TESTS

 

  • Perform Social Engineering Tests
  • Perform Physical Security Tests on Facilities

 

 

CONDUCTING ACTIVE RECONNAISSANCE

 

  • Scan Networks
  • Enumerate Targets
  • Scan for Vulnerabilities
  • Analyze Basic Scripts

Course Outline | Day 03

ANALYSING VULNERABILITIES

  • Analyze Vulnerability Scan Results
  • Leverage Information to Prepare for Exploitation

 

PENETRATING NETWORKS

  • Exploit Network-Based Vulnerabilities
  • Exploit Wireless and RF-Based Vulnerabilities
  • Exploit Specialized Systems

Course Outline | Day 04

EXPLOITING HOST-BASED VULNERABILITIES

  • Exploit Windows-Based Vulnerabilities
  • Exploit *Nix-Based Vulnerabilities

 

TESTING APPLICATIONS

  • Exploit Web Application Vulnerabilities
  • Test Source Code and Compiled Apps

Course Outline | Day 05

COMPLETING POST-EXPLOIT TASKS

  • Use Lateral Movement Techniques
  • Use Persistence Techniques
  • Use Anti-Forensics Techniques

 

ANALYZING AND REPORTING PEN TEST RESULTS

 

  • Analyze Pen Test Data
  • Develop Recommendations for Mitigation Strategies
  • Write and Handle Reports
  • Conduct Post-Report-Delivery Activities
Course Certificates
BOOST Logo

BOOST’s Professional Attendance Certificate “BPAC”

BPAC is always given to the delegates after completing the training course,and depends on their attendance of the program at a rate of no less than 80%,besides their active participation and engagement during the program sessions.

Request a Quote
Follow us
facebook iconinstagram iconlinkedIn icontwitter icon
BOOST Logo

Since 2001, we have been pioneering the training field in the Middle East, helping individuals, teams, and organizations reach their full potential with integrated solutions.

left

🔗 Quick Links

Boost Abroad logoSparks logo

Sister Companies to Boost Consulting and Training

Training Image 1Training Image 2Training Image 3Training Image 4Training Image 5Training Image 6

We believe in progress for everyone.

We helped more than 10,000 clients over 20 countries on 4 continents in boosting their knowledge, skills, and careers.

Copy rights

Boost Training And Consulting All Copyrights Reserved 2025