CompTIA PenTest+ (Ethical Hacking)

CompTIA PenTest+ Ethical Hacking introduces the core concepts of penetration testing, including vulnerability assessment, threat analysis, exploitation methods, and reporting practices. This course helps learners understand how ethical hackers identify security weaknesses and support stronger cyber security frameworks within organisations.

CompTIA PenTest+ (Ethical Hacking)
h h h

Get access to 5000+ courses including this for only £49. Learn More.

Overview of CompTIA PenTest+ (Ethical Hacking)

CompTIA PenTest+ ethical hacking training develops penetration testing expertise, covering vulnerability assessment, threat analysis and cybersecurity testing fundamentals, aligned with structured planning, engagement scoping and professional reporting standards globally recognised.

Through network security and web application security modules, learners practise exploit techniques, information gathering, scanning and network-based attacks, including cloud environments, social engineering, fragile systems and red teaming methods skills.

Advanced sections focus on post-exploitation, tools and programming, reporting, and post-engagement activities, strengthening lab discipline, communication and ethical decision-making required for real-world penetration testing engagements across modern networked enterprise infrastructures.

Learning Outcomes of CompTIA PenTest+ (Ethical Hacking)

Certification

one education Certificate

After completing the CompTIA PenTest+ (Ethical Hacking) assessments, learners qualify for a CPD QS accredited certificate from One Education.

The certificate is available in two formats: a PDF version for £9 or a printed hard copy delivered by post for £15.

Why Study This CompTIA PenTest+ (Ethical Hacking)?

Cyber security threats continue to rise, creating strong demand for professionals who can identify, test, and strengthen system defences before breaches occur. Ethical hacking plays a vital role in protecting organisations by uncovering vulnerabilities and improving overall security posture across networks, applications, and cloud environments.

Studying a CompTIA PenTest+–aligned ethical hacking course develops structured penetration testing knowledge, analytical thinking, and risk awareness used across modern cyber security roles. CPD certification demonstrates professional commitment, strengthens technical credibility, and supports career progression in penetration testing, cyber security analysis, and defensive security functions.

Course Duration

The CompTIA PenTest+ (Ethical Hacking) course includes a total learning time of 14 hours and 38 minutes. The programme is structured so learners can progress steadily through the content, with most completing the course over a short period depending on how regularly they engage with the material and their individual study commitment.

Requirements

The CompTIA PenTest+ (Ethical Hacking) course has accessible entry requirements and is designed to suit a wide range of learners. A basic understanding of networking concepts, operating systems, and general IT fundamentals is beneficial, along with an interest in cyber security and ethical hacking practices. The course is delivered entirely online and can be accessed on any internet-enabled device, allowing learners to study from a location and schedule that suits their personal commitments.

Career Path

Frequently Asked Questions

CompTIA PenTest+ focuses on penetration testing and vulnerability assessment, helping learners understand how to identify, analyse, and report security weaknesses within systems and networks.

CompTIA PenTest+ is best suited for individuals with prior IT or cybersecurity knowledge, as it builds on networking, security fundamentals, and basic scripting concepts.

Advanced coding skills are not required, but familiarity with scripting languages such as Python or Bash is helpful for understanding automation and testing scenarios.

CompTIA PenTest+ combines theoretical knowledge with performance-based assessment, focusing on real-world penetration testing processes and reporting techniques.

The certification emphasises applied knowledge through scenario-based questions, but learning providers may offer simulated environments rather than live systems.

Course Curriculum

Introduction
Introduction to the CompTIA PenTest+ (PT0-002) Course 00:02:00
About the CompTIA PenTest+ (PT0-002) Exam 00:07:00
Section 01: Planning and Engagement
Planning a Pen Test 00:08:00
Rules of Engagement 00:10:00
Regulatory Compliance 00:04:00
Resources and Budget 00:07:00
Impact and Constraints 00:05:00
Support Resources 00:13:00
Legal Groundwork 00:12:00
Service Provider Agreements 00:02:00
Standards and Methodologies, Part 1 00:07:00
Standards and Methodologies, Part 2 00:09:00
Environmental and Scoping Considerations 00:14:00
Ethical Mindset 00:06:00
Lab Environment Setup 00:18:00
Project Strategy and Risk 00:09:00
Scope Vulnerabilities 00:13:00
Compliance-Based Assessments 00:04:00
Section 02: Information Gathering and Vulnerability Scanning
Scanning and Enumeration 00:04:00
Scanning Demo 00:11:00
Packet Investigation 00:08:00
Packet Inspection Demo 00:06:00
Labtainers Setup 00:12:00
Labtainers Lab (Wireshark) 00:07:00
Application and Open-Source Resources 00:12:00
Passive Reconnaissance 00:10:00
Active Reconnaissance 00:08:00
Vulnerability Scanning 00:09:00
Vulnerability Scanning Demo 00:16:00
Labtainers Lab (Network Basics) 00:03:00
Labtainers Lab (Nmap Discovery) 00:03:00
Target Considerations 00:16:00
Analyzing Scan Output 00:05:00
Nmap Scoping and Output Options 00:21:00
Nmap Timing and Performance Options 00:07:00
Prioritization of Vulnerabilities 00:09:00
Common Attack Techniques 00:12:00
Automating Vulnerability Scans 00:04:00
Credential Attacks 00:15:00
Labtainers Lab (Password Cracking) 00:02:00
Labtainers Lab (Secure Socket Layers) 00:02:00
Labtainers Lab (Routing Basics) 00:02:00
Section 03: Network-Based Attacks
Exploit Resources and Network Attacks 00:05:00
Network-Based Exploits 00:07:00
FTP Exploit Demo 00:08:00
Man-in-the-middle Exploits 00:07:00
Labtainers Lab (TCP/IP Attacks) 00:02:00
Labtainers Lab (ARP Spoof Attacks) 00:02:00
Labtainers Lab (Local DNS Attacks) 00:02:00
Labtainers Lab (MACs and Hash Functions) 00:01:00
Section 04: Selecting Pen Testing Tools
Wireless Exploits, Part 1 00:13:00
Wireless Exploits, Part 2 00:03:00
Antennas 00:04:00
Section 05: Reporting and Communication
OWASP Top 10 00:09:00
Application Exploits, Part 1 00:06:00
SQL Injection Demo 00:09:00
Labtainers Lab (SQL Injection) 00:03:00
Application Exploits, Part 2 00:08:00
Application Exploits, Part 3 00:09:00
Cross-Site Scripting Demo 00:07:00
Labtainers Lab (Cross-Site Scripting) 00:02:00
Labtainers Lab (Cross-Site Request Forgery) 00:01:00
Code Vulnerabilities 00:17:00
API Attacks and Attack Resources 00:06:00
Privilege Escalation (Linux) 00:10:00
Privilege Escalation (Windows) 00:06:00
Misc. Privilege Escalation 00:08:00
Misc. Local Host Vulnerabilities 00:08:00
Section 06: Attacking the Cloud
Cloud Attacks, Part 1 00:05:00
Cloud Attacks, Part 2 00:05:00
Section 07: Specialized and Fragile Systems
Mobile Attacks 00:10:00
IoT Attacks 00:10:00
Data Storage and Management Interface Attacks 00:09:00
Virtual and Containerized Environment Attacks 00:08:00
Labtainers Lab (Industrial Control System) 00:02:00
Section 08: Social Engineering and Physical Attacks
Pretext for a Social Engineering Attack 00:03:00
Remote Social Engineering 00:06:00
Spear Phishing Demo 00:10:00
In-Person Social Engineering 00:12:00
Physical Security 00:11:00
Section 09: Post-Exploitation
Post-Exploitation Techniques 00:11:00
Post-Exploitation Tools 00:03:00
Network Segmentation Testing 00:03:00
Persistence and Stealth 00:11:00
Detection Avoidance Techniques 00:06:00
Section 10: Post-Engagement Activities
Report Writing 00:15:00
Important Components of Written Reports 00:03:00
Mitigation Strategies 00:05:00
Technical and Physical Controls 00:04:00
Administrative and Operational Controls 00:05:00
Communication 00:09:00
Presentation of Findings 00:03:00
Post-Report Activities 00:05:00
Data Destruction Process 00:02:00
Section 11: Tools and Programming
Using Scripting in Pen Testing 00:13:00
Bash Scripting Basics 00:15:00
Bash Scripting Techniques 00:10:00
PowerShell Scripts 00:04:00
Ruby Scripts 00:07:00
Python Scripts 00:06:00
Scripting Languages Comparison 00:11:00
Data Structures, Part 1 00:08:00
Data Structures, Part 2 00:08:00
Libraries 00:03:00
Classes 00:08:00
Procedures and Functions 00:06:00
Perl and JavaScript 00:06:00
Section 12: Tools Inventory
Pen Testing Toolbox 00:07:00
Using Kali Linux 00:06:00
Scanners & Credential Tools 00:10:00
Code-Cracking Tools 00:04:00
Open-Source Research Tools 00:06:00
Wireless and Web Pen Testing Tools 00:11:00
Remote Access Tools 00:06:00
Analyzers and Mobile Pen Testing Tools 00:02:00
Other Pen Testing Tools 00:04:00
Labtainers Lab (Metasploit Framework) 00:02:00
Labtainers Lab (Wireshark Packet Inspection) 00:02:00
Labtainers Lab (SSH) 00:01:00
Scanners, Debuggers, and Wireless Tools 00:10:00
Web, Steganography, and Cloud Tools 00:09:00
top

Hear What Our Learners Say About Us

OE Footer
Home Search Cart