Course Highlights
In a world where cyber threats evolve daily, Ethical Hacking has become a critical skill for safeguarding digital systems. The CompTIA PenTest+ (Ethical Hacking) PT0-002 course is designed for individuals who aspire to build or advance their careers in penetration testing and cyber security. This globally recognised certification validates your ability to identify vulnerabilities, test system security, and respond effectively to breaches. With organisations prioritising robust defences, skilled penetration testers are in demand across various industries, including finance, healthcare, and government.
As the demand for CompTIA PenTest certified professionals grows, this course equips learners with advanced skills to thrive in the rapidly expanding cyber security field. You will gain expertise in planning engagements, gathering intelligence, simulating network-based attacks, and handling post-exploitation processes. With specialised modules covering cloud systems, fragile infrastructure, and social engineering, the curriculum ensures you’re prepared to tackle challenges in complex environments. Mastering these skills will not only enhance your career prospects but position you as a leader in ethical cyber security.
The CompTIA PenTest+ (Ethical Hacking) PT0-002 certification is a gateway to lucrative roles such as penetration tester, security consultant, or ethical hacker. This course bridges the gap between technical expertise and strategic thinking, empowering you to protect organisations from cyber threats while advancing your professional growth. Embrace this opportunity to future-proof your career and stay ahead in the dynamic world of cyber security.
Learning outcome
- Master penetration testing planning and engagement strategies.
- Perform in-depth information gathering and vulnerability scanning.
- Execute network-based attacks with precision and efficiency.
- Utilize specialized tools for effective penetration testing.
- Mitigate risks associated with cloud vulnerabilities and fragile systems.
- Analyze post-exploitation data to enhance security protocols.
- Develop comprehensive reports and communicate findings effectively.
Course media
Why should I take this course?
- Gain a globally recognized certification in ethical hacking.
- Enhance your career prospects in the thriving cybersecurity industry.
- Learn cutting-edge techniques to identify and resolve vulnerabilities.
- Equip yourself with skills demanded by top UK employers.
- Stay ahead in a rapidly evolving digital landscape.
Certificate of Achievement
Skill Up Recognised Certificate
Upon successful completion of the Digital Marketing Certification Course, you can request a Skill Up Recognised Certificate. This certification carries great significance and remains a testament to your skills for a lifetime.
- PDF Certificate + PDF Transcript: £14.99
- Hardcopy Certificate + Hardcopy Transcript: £19.99
- Delivery Charge: £10.00 (Applicable for International Students)
Click below to order your Skill Up Brand Recognised Certificate, complete your payment and get ready to upgrade your resume.
Order Your Skill Up Brand Recognised Certificate
CPD Quality Standards Accredited Certificate
The CPD Quality Standards Accredited Certificate of Achievement is available for application when you successfully finish the Digital Marketing Certificate Course.
Order your CPD Quality Standards Accredited Certificate by clicking the link below, then finish the purchase process to bolster your professional portfolio.
Order Your CPD QS Certificate
Career Path
- Penetration Tester: £45,000–£70,000 per year
- Security Consultant: £50,000–£85,000 per year
- Ethical Hacker: £60,000–£100,000 per year
- Vulnerability Assessment Specialist: £42,000–£75,000 per year
- Cyber Security Analyst: £40,000–£65,000 per year
Requirements
- Basic knowledge of networking and cybersecurity principles.
- Access to a computer or a device with internet connectivity.
- A strong interest in ethical hacking and penetration testing.
Course Curriculum
-
Introduction to the CompTIA PenTest+ (PT0-002) Course
00:02:00
-
About the CompTIA PenTest+ (PT0-002) Exam
00:07:00
-
Planning a Pen Test
00:08:00
-
Rules of Engagement
00:10:00
-
Regulatory Compliance
00:04:00
-
Resources and Budget
00:07:00
-
Impact and Constraints
00:05:00
-
Support Resources
00:13:00
-
Legal Groundwork
00:12:00
-
Service Provider Agreements
00:02:00
-
Service Provider Agreements
00:02:00
-
Standards and Methodologies, Part 1
00:07:00
-
Standards and Methodologies, Part 2
00:09:00
-
Environmental and Scoping Considerations
00:14:00
-
Ethical Mindset
00:06:00
-
Lab Environment Setup
00:18:00
-
Project Strategy and Risk
00:09:00
-
Scope Vulnerabilities
00:13:00
-
Compliance-Based Assessments
00:04:00
-
Scanning and Enumeration
00:04:00
-
Scanning Demo
00:11:00
-
Packet Investigation
00:08:00
-
Packet Inspection Demo
00:06:00
-
Labtainers Setup
00:12:00
-
Labtainers Lab (Wireshark)
00:09:00
-
Application and Open-Source Resources
00:12:00
-
Passive Reconnaissance
00:10:00
-
Active Reconnaissance
00:08:00
-
Vulnerability Scanning
00:09:00
-
Vulnerability Scanning Demo
00:17:00
-
Labtainers Lab (Network Basics)
00:03:00
-
Labtainers Lab (Nmap Discovery)
00:03:00
-
Target Considerations
00:16:00
-
Analyzing Scan Output
00:06:00
-
Nmap Scoping and Output Options
00:21:00
-
Nmap Timing and Performance Options
00:07:00
-
Prioritization of Vulnerabilities
00:09:00
-
Common Attack Techniques
00:12:00
-
Automating Vulnerability Scans
00:04:00
-
Credential Attacks
00:15:00
-
Labtainers Lab (Password Cracking)
00:02:00
-
Labtainers Lab (Secure Socket Layers)
00:03:00
-
Labtainers Lab (Routing Basics)
00:02:00
-
Exploit Resources and Network Attacks
00:05:00
-
Network-Based Exploits
00:07:00
-
FTP Exploit Demo
00:08:00
-
Man-in-the-middle Exploits
00:07:00
-
Labtainers Lab (TCP/IP Attacks)
00:02:00
-
Labtainers Lab (ARP Spoof Attacks)
00:02:00
-
Labtainers Lab (Local DNS Attacks)
00:02:00
-
Labtainers Lab (MACs and Hash Functions)
00:01:00
-
Wireless Exploits, Part 1
00:13:00
-
Wireless Exploits, Part 2
00:03:00
-
Antennas
00:04:00
-
OWASP Top 10
00:09:00
-
Application Exploits, Part 1
00:06:00
-
SQL Injection Demo
00:09:00
-
Labtainers Lab (SQL Injection)
00:03:00
-
Application Exploits, Part 2
00:08:00
-
Application Exploits, Part 3
00:09:00
-
Cross-Site Scripting Demo
00:07:00
-
Labtainers Lab (Cross-Site Scripting)
00:02:00
-
Labtainers Lab (Cross-Site Request Forgery)
00:01:00
-
Code Vulnerabilities
00:17:00
-
API Attacks and Attack Resources
00:06:00
-
Privilege Escalation (Linux)
00:10:00
-
Privilege Escalation (Windows)
00:06:00
-
Misc. Privilege Escalation
00:08:00
-
Misc. Local Host Vulnerabilities
00:08:00
-
Cloud Attacks, Part 1
00:05:00
-
Cloud Attacks, Part 2
00:05:00
-
Mobile Attacks
00:10:00
-
IoT Attacks
00:10:00
-
Data Storage and Management Interface Attacks
00:09:00
-
Virtual and Containerized Environment Attacks
00:08:00
-
Labtainers Lab (Industrial Control System)
00:02:00
-
Pretext for a Social Engineering Attack
00:03:00
-
Remote Social Engineering
00:06:00
-
In-Person Social Engineering
00:12:00
-
Spear Phishing Demo
00:10:00
-
Physical Security
00:11:00
-
Post-Exploitation Techniques
00:11:00
-
Post-Exploitation Tools
00:03:00
-
Network Segmentation Testing
00:03:00
-
Persistence and Stealth
00:11:00
-
Detection Avoidance Techniques
00:06:00
-
Report Writing
00:15:00
-
Important Components of Written Reports
00:03:00
-
Mitigation Strategies
00:05:00
-
Technical and Physical Controls
00:04:00
-
Administrative and Operational Controls
00:05:00
-
Communication
00:09:00
-
Presentation of Findings
00:03:00
-
Post-Report Activities
00:05:00
-
Data Destruction Process
00:02:00
-
Using Scripting in Pen Testing
00:13:00
-
Bash Scripting Basics
00:15:00
-
Bash Scripting Techniques
00:10:00
-
PowerShell Scripts
00:04:00
-
Ruby Scripts
00:07:00
-
Python Scripts
00:07:00
-
Scripting Languages Comparison
00:11:00
-
Data Structures, Part 1
00:08:00
-
Data Structures, Part 2
00:08:00
-
Libraries
00:03:00
-
Classes
00:08:00
-
Procedures and Functions
00:06:00
-
Perl and JavaScript
00:06:00
-
Pen Testing Toolbox
00:07:00
-
Using Kali Linux
00:06:00
-
Scanners & Credential Tools
00:10:00
-
Code-Cracking Tools
00:04:00
-
Open-Source Research Tools
00:06:00
-
Wireless and Web Pen Testing Tools
00:11:00
-
Remote Access Tools
00:06:00
-
Analyzers and Mobile Pen Testing Tools
00:02:00
-
Other Pen Testing Tools
00:04:00
-
Labtainers Lab (Metasploit Framework)
00:02:00
-
Labtainers Lab (Wireshark Packet Inspection)
00:02:00
-
Labtainers Lab (SSH)
00:01:00
-
Scanners, Debuggers, and Wireless Tools
00:10:00
-
Web, Steganography, and Cloud Tools
00:09:00
14-Day Money-Back Guarantee
-
Duration:14 hours, 46 minutes
-
Access:1 Year
-
Units:122


Want to get everything for £149
Take Lifetime Pack