{"course":{"productid":25741,"modality":1,"active":true,"language":"fr","title":"CompTIA Penetration Testing","productcode":"PENTEST+","vendorcode":"CO","vendorname":"CompTIA","fullproductcode":"CO-PENTEST+","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/25741","objective":"<p>You&#039;ll learn to:<\/p>\n<ul>\n<li>customise assessment frameworks<\/li><li>report penetration test findings<\/li><li>communicate recommended strategies<\/li><\/ul><p>On this course, you&#039;ll prepare for the CompTIA PenTest+ exam The performance-based PenTest+ exam involves hands-on simulations, proving you&#039;ve moved beyond theory and have the practical skills to carry out penetration testing techniques.<\/p>\n<p>Achieving this certification qualifies you for a role as a:<\/p>\n<ul>\n<li>Penetration Tester<\/li><li>Vulnerability Tester<\/li><li>Security Analyst (II)<\/li><li>Vulnerability Assessment Analyst<\/li><li>Network Security Operations<\/li><li>Application Security Vulnerability<\/li><\/ul>","essentials":"<p>Before attending this course, you should have:<\/p>\n<ul>\n<li>Network+, Security+ or equivalent knowledge<\/li><li>A minimum of 2-3 years of hands-on information security or related experience<\/li><\/ul>","audience":"<p>If you&#039;re an intermediate level cyber security professional tasked with penetration testing, this course is ideal for you.<\/p>","contents":"<h5>Planning and Scoping<\/h5><ul>\n<li>Explain the importance of planning for an engagement<\/li><li>Explain key legal concepts.<\/li><li>Explain the importance of scoping an engagement properly.<\/li><li>Explain the key aspects of compliance-based assessments.<\/li><\/ul><h5>Information Gathering and Vulnerability Identification<\/h5><ul>\n<li>Given a scenario, conduct information gathering using appropriate techniques<\/li><li>Given a scenario, perform a vulnerability scan.<\/li><li>Given a scenario, analyse vulnerability scan results<\/li><li>Explain the process of leveraging information to prepare for exploitation.<\/li><li>Explain weaknesses related to specialised systems<\/li><\/ul><h5>Attacks and Exploits<\/h5><ul>\n<li>Compare and contrast social engineering attacks<\/li><li>Given a scenario, exploit network-based vulnerabilities<\/li><li>Given a scenario, exploit wireless and RF-based vulnerabilities<\/li><li>Given a scenario, exploit application-based vulnerabilities<\/li><li>Given a scenario, exploit local host vulnerabilities<\/li><li>Summarise physical security attacks related to facilities<\/li><li>Given a scenario, perform post-exploitation techniques<\/li><\/ul><h5>Penetration Testing Tools<\/h5><ul>\n<li>Given a scenario, use Nmap to conduct information gathering exercises<\/li><li>Compare and contrast various use cases of tools<\/li><li>Given a scenario, analyse tool output or data related to a penetration test<\/li><li>Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)<\/li><\/ul><h5>Reporting and Communication<\/h5><ul>\n<li>Given a scenario, use report writing and handling best practices<\/li><li>Explain post-report delivery activities<\/li><li>Given a scenario, recommend mitigation strategies for discovered vulnerabilities<\/li><li>Explain the importance of communication during the penetration testing process<\/li><\/ul>","outline":"<h5>Planning and Scoping<\/h5><ul>\n<li>Explain the importance of planning for an engagement<\/li><li>Explain key legal concepts.<\/li><li>Explain the importance of scoping an engagement properly.<\/li><li>Explain the key aspects of compliance-based assessments.<\/li><\/ul><h5>Information Gathering and Vulnerability Identification<\/h5><ul>\n<li>Given a scenario, conduct information gathering using appropriate techniques<\/li><li>Given a scenario, perform a vulnerability scan.<\/li><li>Given a scenario, analyse vulnerability scan results<\/li><li>Explain the process of leveraging information to prepare for exploitation.<\/li><li>Explain weaknesses related to specialised systems<\/li><\/ul><h5>Attacks and Exploits<\/h5><ul>\n<li>Compare and contrast social engineering attacks<\/li><li>Given a scenario, exploit network-based vulnerabilities<\/li><li>Given a scenario, exploit wireless and RF-based vulnerabilities<\/li><li>Given a scenario, exploit application-based vulnerabilities<\/li><li>Given a scenario, exploit local host vulnerabilities<\/li><li>Summarise physical security attacks related to facilities<\/li><li>Given a scenario, perform post-exploitation techniques<\/li><\/ul><h5>Penetration Testing Tools<\/h5><ul>\n<li>Given a scenario, use Nmap to conduct information gathering exercises<\/li><li>Compare and contrast various use cases of tools<\/li><li>Given a scenario, analyse tool output or data related to a penetration test<\/li><li>Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)<\/li><\/ul><h5>Reporting and Communication<\/h5><ul>\n<li>Given a scenario, use report writing and handling best practices<\/li><li>Explain post-report delivery activities<\/li><li>Given a scenario, recommend mitigation strategies for discovered vulnerabilities<\/li><li>Explain the importance of communication during the penetration testing process<\/li><\/ul>","summary":"<p>In this course, you&#039;ll get the skills you need to identify, exploit, report, and manage vulnerabilities on a network.<\/p>\n<p>This course builds upon skills learnt from CompTIA Security+ certification and provides you with the intermediate skills and best practice for penetration testing.<\/p>\n<p>Your expert instructor will teach you up-to-date penetration testing skills, helping you develop vulnerability assessment techniques and the management skills necessary to determine how resilient a network is to attacks.<\/p>","objective_plain":"You'll learn to:\n\n\n- customise assessment frameworks\n- report penetration test findings\n- communicate recommended strategies\nOn this course, you'll prepare for the CompTIA PenTest+ exam The performance-based PenTest+ exam involves hands-on simulations, proving you've moved beyond theory and have the practical skills to carry out penetration testing techniques.\n\nAchieving this certification qualifies you for a role as a:\n\n\n- Penetration Tester\n- Vulnerability Tester\n- Security Analyst (II)\n- Vulnerability Assessment Analyst\n- Network Security Operations\n- Application Security Vulnerability","essentials_plain":"Before attending this course, you should have:\n\n\n- Network+, Security+ or equivalent knowledge\n- A minimum of 2-3 years of hands-on information security or related experience","audience_plain":"If you're an intermediate level cyber security professional tasked with penetration testing, this course is ideal for you.","contents_plain":"Planning and Scoping\n\n\n- Explain the importance of planning for an engagement\n- Explain key legal concepts.\n- Explain the importance of scoping an engagement properly.\n- Explain the key aspects of compliance-based assessments.\nInformation Gathering and Vulnerability Identification\n\n\n- Given a scenario, conduct information gathering using appropriate techniques\n- Given a scenario, perform a vulnerability scan.\n- Given a scenario, analyse vulnerability scan results\n- Explain the process of leveraging information to prepare for exploitation.\n- Explain weaknesses related to specialised systems\nAttacks and Exploits\n\n\n- Compare and contrast social engineering attacks\n- Given a scenario, exploit network-based vulnerabilities\n- Given a scenario, exploit wireless and RF-based vulnerabilities\n- Given a scenario, exploit application-based vulnerabilities\n- Given a scenario, exploit local host vulnerabilities\n- Summarise physical security attacks related to facilities\n- Given a scenario, perform post-exploitation techniques\nPenetration Testing Tools\n\n\n- Given a scenario, use Nmap to conduct information gathering exercises\n- Compare and contrast various use cases of tools\n- Given a scenario, analyse tool output or data related to a penetration test\n- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)\nReporting and Communication\n\n\n- Given a scenario, use report writing and handling best practices\n- Explain post-report delivery activities\n- Given a scenario, recommend mitigation strategies for discovered vulnerabilities\n- Explain the importance of communication during the penetration testing process","outline_plain":"Planning and Scoping\n\n\n- Explain the importance of planning for an engagement\n- Explain key legal concepts.\n- Explain the importance of scoping an engagement properly.\n- Explain the key aspects of compliance-based assessments.\nInformation Gathering and Vulnerability Identification\n\n\n- Given a scenario, conduct information gathering using appropriate techniques\n- Given a scenario, perform a vulnerability scan.\n- Given a scenario, analyse vulnerability scan results\n- Explain the process of leveraging information to prepare for exploitation.\n- Explain weaknesses related to specialised systems\nAttacks and Exploits\n\n\n- Compare and contrast social engineering attacks\n- Given a scenario, exploit network-based vulnerabilities\n- Given a scenario, exploit wireless and RF-based vulnerabilities\n- Given a scenario, exploit application-based vulnerabilities\n- Given a scenario, exploit local host vulnerabilities\n- Summarise physical security attacks related to facilities\n- Given a scenario, perform post-exploitation techniques\nPenetration Testing Tools\n\n\n- Given a scenario, use Nmap to conduct information gathering exercises\n- Compare and contrast various use cases of tools\n- Given a scenario, analyse tool output or data related to a penetration test\n- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)\nReporting and Communication\n\n\n- Given a scenario, use report writing and handling best practices\n- Explain post-report delivery activities\n- Given a scenario, recommend mitigation strategies for discovered vulnerabilities\n- Explain the importance of communication during the penetration testing process","summary_plain":"In this course, you'll get the skills you need to identify, exploit, report, and manage vulnerabilities on a network.\n\nThis course builds upon skills learnt from CompTIA Security+ certification and provides you with the intermediate skills and best practice for penetration testing.\n\nYour expert instructor will teach you up-to-date penetration testing skills, helping you develop vulnerability assessment techniques and the management skills necessary to determine how resilient a network is to attacks.","skill_level":"Beginner","version":"1.0","duration":{"unit":"d","value":5,"formatted":"5 jours"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":2490},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":2490},"IT":{"country":"IT","currency":"EUR","taxrate":20,"price":2490},"FR":{"country":"FR","currency":"EUR","taxrate":19.6,"price":3370},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":1750},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":8640},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":1750},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":1750},"BE":{"country":"BE","currency":"EUR","taxrate":21,"price":2495},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":2495},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":1750},"US":{"country":"US","currency":"USD","taxrate":null,"price":3295},"CA":{"country":"CA","currency":"CAD","taxrate":null,"price":4545},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":2490}}},"lastchanged":"2026-01-21T15:04:10+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/25741","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/25741"}}