<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="25741" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/25741" lastchanged="2026-01-21T15:04:10+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>CompTIA Penetration Testing</title><productcode>PENTEST+</productcode><vendorcode>CO</vendorcode><vendorname>CompTIA</vendorname><fullproductcode>CO-PENTEST+</fullproductcode><version>1.0</version><objective>&lt;p&gt;You&amp;#039;ll learn to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;customise assessment frameworks&lt;/li&gt;&lt;li&gt;report penetration test findings&lt;/li&gt;&lt;li&gt;communicate recommended strategies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;On this course, you&amp;#039;ll prepare for the CompTIA PenTest+ exam The performance-based PenTest+ exam involves hands-on simulations, proving you&amp;#039;ve moved beyond theory and have the practical skills to carry out penetration testing techniques.&lt;/p&gt;
&lt;p&gt;Achieving this certification qualifies you for a role as a:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Penetration Tester&lt;/li&gt;&lt;li&gt;Vulnerability Tester&lt;/li&gt;&lt;li&gt;Security Analyst (II)&lt;/li&gt;&lt;li&gt;Vulnerability Assessment Analyst&lt;/li&gt;&lt;li&gt;Network Security Operations&lt;/li&gt;&lt;li&gt;Application Security Vulnerability&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Before attending this course, you should have:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network+, Security+ or equivalent knowledge&lt;/li&gt;&lt;li&gt;A minimum of 2-3 years of hands-on information security or related experience&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;If you&amp;#039;re an intermediate level cyber security professional tasked with penetration testing, this course is ideal for you.&lt;/p&gt;</audience><contents>&lt;h5&gt;Planning and Scoping&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the importance of planning for an engagement&lt;/li&gt;&lt;li&gt;Explain key legal concepts.&lt;/li&gt;&lt;li&gt;Explain the importance of scoping an engagement properly.&lt;/li&gt;&lt;li&gt;Explain the key aspects of compliance-based assessments.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Information Gathering and Vulnerability Identification&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, conduct information gathering using appropriate techniques&lt;/li&gt;&lt;li&gt;Given a scenario, perform a vulnerability scan.&lt;/li&gt;&lt;li&gt;Given a scenario, analyse vulnerability scan results&lt;/li&gt;&lt;li&gt;Explain the process of leveraging information to prepare for exploitation.&lt;/li&gt;&lt;li&gt;Explain weaknesses related to specialised systems&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Attacks and Exploits&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Compare and contrast social engineering attacks&lt;/li&gt;&lt;li&gt;Given a scenario, exploit network-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit wireless and RF-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit application-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit local host vulnerabilities&lt;/li&gt;&lt;li&gt;Summarise physical security attacks related to facilities&lt;/li&gt;&lt;li&gt;Given a scenario, perform post-exploitation techniques&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Penetration Testing Tools&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, use Nmap to conduct information gathering exercises&lt;/li&gt;&lt;li&gt;Compare and contrast various use cases of tools&lt;/li&gt;&lt;li&gt;Given a scenario, analyse tool output or data related to a penetration test&lt;/li&gt;&lt;li&gt;Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Reporting and Communication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, use report writing and handling best practices&lt;/li&gt;&lt;li&gt;Explain post-report delivery activities&lt;/li&gt;&lt;li&gt;Given a scenario, recommend mitigation strategies for discovered vulnerabilities&lt;/li&gt;&lt;li&gt;Explain the importance of communication during the penetration testing process&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Planning and Scoping&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the importance of planning for an engagement&lt;/li&gt;&lt;li&gt;Explain key legal concepts.&lt;/li&gt;&lt;li&gt;Explain the importance of scoping an engagement properly.&lt;/li&gt;&lt;li&gt;Explain the key aspects of compliance-based assessments.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Information Gathering and Vulnerability Identification&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, conduct information gathering using appropriate techniques&lt;/li&gt;&lt;li&gt;Given a scenario, perform a vulnerability scan.&lt;/li&gt;&lt;li&gt;Given a scenario, analyse vulnerability scan results&lt;/li&gt;&lt;li&gt;Explain the process of leveraging information to prepare for exploitation.&lt;/li&gt;&lt;li&gt;Explain weaknesses related to specialised systems&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Attacks and Exploits&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Compare and contrast social engineering attacks&lt;/li&gt;&lt;li&gt;Given a scenario, exploit network-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit wireless and RF-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit application-based vulnerabilities&lt;/li&gt;&lt;li&gt;Given a scenario, exploit local host vulnerabilities&lt;/li&gt;&lt;li&gt;Summarise physical security attacks related to facilities&lt;/li&gt;&lt;li&gt;Given a scenario, perform post-exploitation techniques&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Penetration Testing Tools&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, use Nmap to conduct information gathering exercises&lt;/li&gt;&lt;li&gt;Compare and contrast various use cases of tools&lt;/li&gt;&lt;li&gt;Given a scenario, analyse tool output or data related to a penetration test&lt;/li&gt;&lt;li&gt;Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Reporting and Communication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Given a scenario, use report writing and handling best practices&lt;/li&gt;&lt;li&gt;Explain post-report delivery activities&lt;/li&gt;&lt;li&gt;Given a scenario, recommend mitigation strategies for discovered vulnerabilities&lt;/li&gt;&lt;li&gt;Explain the importance of communication during the penetration testing process&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>You'll learn to:


- customise assessment frameworks
- report penetration test findings
- communicate recommended strategies
On this course, you'll prepare for the CompTIA PenTest+ exam The performance-based PenTest+ exam involves hands-on simulations, proving you've moved beyond theory and have the practical skills to carry out penetration testing techniques.

Achieving this certification qualifies you for a role as a:


- Penetration Tester
- Vulnerability Tester
- Security Analyst (II)
- Vulnerability Assessment Analyst
- Network Security Operations
- Application Security Vulnerability</objective_plain><essentials_plain>Before attending this course, you should have:


- Network+, Security+ or equivalent knowledge
- A minimum of 2-3 years of hands-on information security or related experience</essentials_plain><audience_plain>If you're an intermediate level cyber security professional tasked with penetration testing, this course is ideal for you.</audience_plain><contents_plain>Planning and Scoping


- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
Information Gathering and Vulnerability Identification


- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
Attacks and Exploits


- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
Penetration Testing Tools


- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyse tool output or data related to a penetration test
- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
Reporting and Communication


- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process</contents_plain><outline_plain>Planning and Scoping


- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
Information Gathering and Vulnerability Identification


- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
Attacks and Exploits


- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
Penetration Testing Tools


- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyse tool output or data related to a penetration test
- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
Reporting and Communication


- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="DE" currency="EUR">2490.00</price><price country="AT" currency="EUR">2490.00</price><price country="IT" currency="EUR">2490.00</price><price country="FR" currency="EUR">3370.00</price><price country="SI" currency="EUR">1750.00</price><price country="IL" currency="ILS">8640.00</price><price country="MK" currency="EUR">1750.00</price><price country="GR" currency="EUR">1750.00</price><price country="BE" currency="EUR">2495.00</price><price country="NL" currency="EUR">2495.00</price><price country="HU" currency="EUR">1750.00</price><price country="US" currency="USD">3295.00</price><price country="CA" currency="CAD">4545.00</price><price country="CH" currency="CHF">2490.00</price></pricelist><miles/></course>