CNSP Certification: Build Real-World Network Security Skills
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

CompTIA Network Security Professional (CNSP)

Learn essential security skills to identify vulnerabilities, analyze threats, and secure systems, advancing your career in network security.


68 Hrs 46 Min276 Videos495 QuestionsCertificate of CompletionClosed Captions

CompTIA Network Security Professional (CNSP)



When a hiring manager sees that you can secure systems, validate vulnerabilities, and analyze threats instead of just talking about them, you move into a different conversation. That is exactly why the cnsp certification matters. CompTIA® built this stackable path for people who already have some IT footing and want to prove they can operate in the security trenches, not just memorize terminology. The CompTIA Network Security Professional, or CNSP, is what you earn after completing the required certification path and passing the associated exams in the CompTIA stack. If you are trying to turn a few years of hands-on experience into credible security validation, this is a path worth taking seriously.

I built this course path to do one thing well: prepare you for the real work behind the stackable certification. You are not being asked to collect random badges. You are building a security foundation across three important disciplines: baseline security, offensive testing, and threat analysis. That is why this course path includes Security+, PenTest+, and CySA+. Together, they create the kind of practical profile employers recognize when they are hiring for SOC roles, security engineering support, vulnerability management, or junior penetration testing work. If you have been looking for a cnsp cert that actually reflects the way security teams operate, this is the right place to start.

Why the cnsp certification is different from a single exam

Most certifications test one slice of knowledge. The cnsp certification is more interesting because it forces you to prove competence across multiple security functions. That matters. In the real world, a security analyst does not live in one silo. You may be hardening endpoints in the morning, reviewing a suspicious alert after lunch, and helping validate a vulnerability report by the end of the day. A certified network security practitioner (CNSP) path reflects that reality better than a narrow, one-dimensional credential.

Here is the big idea behind the path: Security+ gives you the language and fundamentals, PenTest+ teaches you how to think like an attacker without becoming sloppy or reckless, and CySA+ pushes you into detection, analysis, and response. Put together, you get a more complete security story. That is why employers tend to respect stackable certifications. They do not just signal that you passed tests; they signal that you can connect concepts across defense, attack, and analysis. If you are pursuing the cnsp cert because you want more than a resume line, that is the right instinct.

This is also one of the rare cases where the exam sequence actually makes sense. You start with core security controls and risks, then move into testing and exploitation concepts, and then finish by interpreting security data and responding to threats. That progression mirrors the way many professionals mature in the field. You are not just studying for three unrelated exams. You are building a layered understanding of modern network security.

  • Security+ establishes core security terminology and control thinking.
  • PenTest+ develops structured offensive testing skills.
  • CySA+ reinforces detection, monitoring, and response mindset.
  • Together, they support the certified hacking and defense conversation employers care about.

What you actually learn in this CompTIA CNSP path

This course path is built around the material that matters for passing the required exams and functioning better on the job. I am not interested in wasting your time with fluffy theory that never shows up in the field. The skills here are practical, testable, and tied to common security work. You will get comfortable with risk concepts, access control, cryptography basics, incident response, threat intelligence, scanning methodology, exploitation concepts, and the security monitoring workflows analysts use every day.

Security+ gives you the baseline: security architecture, threats, vulnerabilities, identity and access management, secure network design, and incident response fundamentals. PenTest+ shifts gears into reconnaissance, scanning, enumeration, vulnerability validation, exploitation planning, and reporting. CySA+ then reinforces the operational side of security: security data analysis, log review, threat detection, incident response, and remediation recommendations. If you are serious about becoming a stronger practitioner, this combination is hard to beat. It trains both sides of your brain: the attacker’s thought process and the defender’s decision-making.

That balance matters because a lot of people try to learn “certified hacking” concepts without ever learning how defenders actually triage, verify, and respond. That is a mistake. Ethical security work is not about showing off with tools. It is about understanding context, evidence, and impact. This path keeps that perspective front and center.

If you can explain why a control exists, how it fails, and how to detect when it has failed, you are no longer just a technician. You are becoming a security professional.

How the cnsp cert path prepares you for the exams

The cnsp cert path is designed to help you prepare for the three CompTIA exams that make the stackable credential possible. I built the training to be systematic, not random. Each section is meant to reinforce what CompTIA expects you to know, while also helping you think clearly under exam pressure. That matters because these exams do not reward surface familiarity. They reward applied judgment.

For Security+, you will need to know the fundamentals cold: threats, vulnerabilities, governance, identity, secure architecture, and incident concepts. For PenTest+, you need comfort with methodologies, scope, tools, reconnaissance, exploitation, post-exploitation concepts, and professional reporting. For CySA+, you need to interpret alerts, logs, indicators of compromise, and response workflows. This means the path does more than prepare you for multiple-choice questions. It trains you to recognize patterns, eliminate bad options, and select the response that makes sense in a business environment.

One thing I always tell students: do not treat these exams like trivia contests. The best exam preparation comes from understanding intent. Why is the control there? Why is this scan performed before that step? Why would a defender prioritize one alert over another? That kind of reasoning is what gets you through scenario-based questions and, more importantly, through actual work on the job. The cnsp certification is built around that style of thinking.

  • Know the Security+ fundamentals before you move deeper.
  • Practice methodology and reporting discipline for PenTest+.
  • Read logs and alerts like an analyst for CySA+.
  • Focus on decision-making, not memorization alone.

Who should take this course

This course path is best for IT professionals who already have some experience and want to move into cybersecurity with credibility. The ideal student usually has two to five years in IT support, systems administration, networking, help desk escalation, or a junior security role. If you have been touching firewalls, endpoint tools, ticket queues, vulnerability reports, or incident workflows, you are in the right neighborhood. You do not need to be a senior engineer, but you should be comfortable working inside technical environments.

I would also recommend this path if you are the kind of person who likes to understand how systems fail and how attackers exploit those failures. That curiosity is valuable. Security teams need people who can connect details. They need people who notice that a log event is not just noise, or that a poorly segmented subnet is creating unnecessary exposure. If that sounds like you, the CNSP path gives you a structured way to prove it.

This training is also a smart move for career changers already in IT who want to pivot toward security without starting from zero. The stackable model gives you a practical ladder: foundational knowledge first, then testing and analysis. That makes the transition more manageable and more defensible to employers. Instead of saying, “I want to work in cybersecurity,” you can say, “I have studied, tested, and validated the core skills behind the CNSP path.” That difference matters.

  • Help desk and support professionals moving into security
  • Junior network administrators seeking a security credential
  • System administrators expanding into defensive operations
  • Future SOC analysts, security analysts, and vulnerability management staff
  • IT professionals who want a stronger certified hacking foundation without jumping straight into advanced specialization

Skills that translate to real security jobs

The best certification paths strengthen the work you do every week. That is what this one is designed to do. If you are moving toward roles like security analyst, SOC analyst, junior penetration tester, vulnerability analyst, or network security specialist, the skills in this course path are directly relevant. You will learn how to assess risk, validate weaknesses, interpret security evidence, and communicate findings clearly. Those are not academic skills. Those are job skills.

Security teams care deeply about execution. Can you identify what is suspicious? Can you determine whether a finding is real? Can you explain the business impact in plain English? Can you recommend a fix without creating new problems? The cnsp certification path trains those habits. PenTest+ teaches you to respect methodology and evidence. CySA+ teaches you to move from alert to analysis to response. Security+ anchors everything in broader security controls and organizational context.

Salary is always dependent on region, employer size, and experience, but professionals who earn security certifications in this range often position themselves for roles that commonly fall in the approximate range of $60,000 to $110,000 in the U.S., with higher compensation possible in major markets or specialized environments. The real benefit is not just salary, though. It is access. This path helps you qualify for conversations that were previously out of reach.

  1. Recognize threats and control gaps faster.
  2. Document technical findings with credibility.
  3. Support incident response and vulnerability management.
  4. Understand offensive testing well enough to improve defenses.
  5. Speak to managers and peers with more confidence and less guesswork.

How the course is structured for self-paced success

This is an on-demand course, so you control the pace. That matters more than people realize. Security topics build on one another, and forcing a rushed timeline usually creates weak retention. Self-paced learning lets you slow down for the parts that need repetition and move faster when a topic clicks. That is especially useful in a multi-exam path like this one, where the concepts are related but not identical.

I designed the training experience to support that style of learning because security professionals do not all study in the same way. Some of you will want to review a topic twice. Some of you will want to pause, take notes, and then test yourselves with practice questions. Some of you will want to map everything back to your current job duties. All of that is valid. The important thing is that you keep moving with purpose. A stackable path like CNSP rewards consistency more than cramming.

The best way to use this training is to work through it in layers. Learn the concept, connect it to a real-world example, then test yourself. If you do that, you will retain more and struggle less when you get to exam day. This is especially important for the cnsp certification because the exams cover both broad knowledge and applied decision-making.

What to expect from the exam domains

Each exam in the path has its own personality, and you should respect that. Security+ tends to reward broad security literacy. You will be dealing with terminology, protocols, access controls, risk concepts, architecture, and incident response basics. PenTest+ expects you to understand authorized testing workflows, reconnaissance, scanning, exploitation concepts, tools, and reporting. CySA+ wants you to think like an analyst: what does the data mean, how do you validate it, and what action should follow?

That variety is why this path is so valuable. It prevents you from becoming one of those professionals who only knows how to scan but not how to defend, or only knows how to investigate but not how to explain technical risk. The cnsp cert rewards range. It is a practical signal that you can contribute in more than one part of the security lifecycle.

If you are preparing for the exams themselves, pay close attention to scenario wording. CompTIA questions often tell you what kind of environment you are in, what the business constraint is, and what outcome is most appropriate. Those details matter. The answer is often the one that is most secure, most methodical, or most operationally realistic. That is the mindset I want you building throughout this path.

Exam success in this path comes from understanding the job behind the question, not just the vocabulary in the question.

Prerequisites and what you should know before starting

You do not need to be an expert to begin, but you should not walk in cold either. A foundation in general IT support, networking, operating systems, or systems administration will help you tremendously. If you have worked with TCP/IP basics, user accounts, patching, security tools, or common endpoint issues, you already have useful context. That experience will make the material feel less abstract and more actionable.

If you are missing some of that background, you can still succeed, but you should be ready to slow down and reinforce the basics. That is not a weakness. It is good judgment. Security is built on layers, and the people who rush past fundamentals usually pay for it later. I would much rather see you master the basics and then move confidently into PenTest+ and CySA+ than pretend you are ready before you are. Good security work demands patience.

As for tools and concepts, you should expect to become familiar with security scanning, log analysis, vulnerability concepts, and defensive workflows. You do not need to walk in as a certified hacker. You need curiosity, consistency, and the willingness to think critically. Those qualities will take you much further than memorizing a few acronyms and hoping for the best.

Why this course matters for your career

If your goal is to move beyond general IT support and into a security-focused role, the cnsp certification gives you a credible bridge. It says you understand the fundamentals, can participate in testing, and can support analysis and response. That combination is useful to employers because it reduces training time and improves trust. They are not hiring you to be perfect on day one. They are hiring you to contribute intelligently.

From a career standpoint, this path also helps you build momentum. Once you have the CNSP stack in motion, you are better positioned to pursue more specialized paths later: deeper penetration testing, incident response, cloud security, or security engineering. The point is not to stop here. The point is to use this as a strong, practical step forward.

If you are serious about a security career, do not wait for some mythical “perfect time” to begin. Start where you are, use the material consistently, and build real capability. That is the value of a stackable path like this one. It rewards the student who is willing to study smart, think clearly, and stick with the process. That is how you earn the CNSP badge and, more importantly, how you become the kind of professional security teams want on their side.

CompTIA® is a trademark of CompTIA. This content is for educational purposes.

Module 1 – Introduction to Security
  • 1.1 Introduction to Security
Module 2 – Malware and Social Engineering Attacks
  • 2.1 Malware and Social Engineering Attacks
Module 3 – Basic Cryptography
  • 3.1 Basic Cryptography
Module 4 – Advanced Cryptography and PKI
  • 4.1 Advanced Cryptography and PKI
Module 5 – Networking and Server Attacks
  • 5.1 Networking and Server Attacks
Module 6 – Network Security Devices, Designs and Technology
  • 6.1 Network Security Devices, Designs and Technology
Module 7 – Administering a Secure Network
  • 7.1 Administering a Secure Network
Module 8 – Wireless Network Security
  • 8.1 Wireless Network Security
Module 9 – Client and Application Security
  • 9.1 Client and Application Security
Module 10 – Mobile and Embedded Device Security
  • 10.1 Mobile and Embedded Device Security
Module 11 – Authentication and Account Management
  • 11.1 Authentication and Account Management
Module 12 – Access Management
  • 12.1 Access Management
Module 13 – Vulnerability Assessment and Data Security
  • 13.1 Vulnerability Assessment and Data Security
Module 14 – Business Continuity
  • 14.1 Business Continuity
Module 15 – Risk Mitigation
  • 15.1 Risk Mitigation
Module 16 – Security Plus Summary and Review
  • 16.1 – Security Plus Summary and Review
Module 17 – Hands-On Training
  • 17.1 Hands-On Scanning Part 1
  • 17.2 Hands-On Scanning Part 2
  • 17.3 Hands-On Advanced Scanning
  • 17.4 Hands-On MetaSploit
  • 17.5 Hands-On BurpSuite
  • 17.6 Hands-On Exploitation Tools Part 1
  • 17.7 Hands-On Exploitation Tools Part 2
  • 17.8 Hands-On Invisibility Tools
  • 17.9 Hands-On Connect to Tor
Module 1: Threat and Vulnerability Management
  • Instructor Intro
  • About the Exam
  • Test Taking Tips and Techniques
  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities Pt 1
  • Given a scenario, perform vulnerability management activities Pt 2
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the Cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
  • Outline
  • Given a scenario, apply security solutions for infrastructure management Pt 1
  • Given a scenario, apply security solutions for infrastructure management Pt 2
  • Given a scenario, apply security solutions for infrastructure management Pt 3
  • Flashcards
  • Explain software assurance best practices
  • Scatter
  • Explain hardware assurance best practices
  • Learn
  • Speller
  • Workbook
Module 3: Security Operations and Monitoring
  • Given a scenario, analyze data as part of security monitoring activities Pt 1
  • Given a scenario, analyze data as part of security monitoring activities Pt 2
  • Given a scenario, analyze data as part of security monitoring activities Pt 3
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies
Module 4: Incident Response
  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate the incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  • Explain the importance of frameworks, policies, procedures, and controls Pt 1
  • Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
  • Recap
  • Review Questions
  • Before the Exam
Module 1 – The Pen Test Engagement
  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review
Module 5 – Social Engineering
  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes
Module 11 – Linux Exploits
  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review
Module 12 – Mobile Devices
  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review
Module 13 – Specialized Systems
  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review
Module 14 – Scripts
  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review
Module 15 – Application Testing
  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering
Module 16 – Web App Exploits
  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review
Module 17 – Lateral Movement
  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review
Module 18 – Persistence
  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review
Module 19 – Cover Your Tracks
  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review
Module 20 – The Report
  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review
Module 21 – Post Engagement Cleanup
  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

[ FAQ ]

Frequently Asked Questions.

What skills does the CompTIA CNSP certification validate?

The CompTIA CNSP certification validates a professional’s ability to secure network systems, identify vulnerabilities, and analyze threats effectively. It confirms that the holder has practical skills in implementing security measures, configuring security tools, and responding to security incidents.

This certification emphasizes hands-on expertise, ensuring that candidates can operate within real-world security environments. It covers core competencies such as network security architecture, threat detection, vulnerability management, and incident response, making it ideal for security professionals aiming to demonstrate their operational capabilities rather than just theoretical knowledge.

Is the CNSP certification suitable for someone with no prior IT security experience?

The CNSP certification is designed for individuals who already have some foundational IT experience, particularly in networking or system administration. It is not typically recommended for complete beginners in IT security, as it builds on existing knowledge of networking concepts and security fundamentals.

If you are new to IT security, it’s advisable to gain relevant experience or complete introductory courses in cybersecurity and networking before pursuing CNSP. This ensures you will understand the practical applications and complex topics covered in the certification exam, increasing your chances of success.

How does the CNSP certification compare to other security certifications like CISSP or Security+?

The CNSP certification is focused on operational security skills, emphasizing hands-on abilities to secure systems, identify vulnerabilities, and analyze threats. It is ideal for professionals looking to demonstrate practical security expertise in real-world scenarios.

In contrast, certifications like CISSP are broader and more strategic, covering management, policies, and governance aspects of security. Security+ provides foundational knowledge suitable for entry-level security roles. CNSP is more specialized and technical, making it a great choice for those already working in IT security roles seeking to validate their operational skills.

What topics are covered in the CNSP certification exam?

The CNSP exam covers essential areas such as network security architecture, vulnerability assessment, threat detection, incident response, and security best practices. Candidates learn to configure and manage security tools, analyze security logs, and respond to security breaches effectively.

The training focuses on practical skills like implementing secure network designs, conducting threat analysis, and validating vulnerabilities using various tools and techniques. This comprehensive coverage ensures candidates are prepared for real-world security challenges faced by organizations today.

How can I prepare effectively for the CNSP certification exam?

Effective preparation involves a combination of hands-on experience, study guides, and practice exams. Gaining practical experience with network security tools and techniques is crucial for understanding real-world applications.

Many training providers offer courses specifically designed for CNSP exam preparation, which include labs, simulations, and mock tests. Additionally, reviewing the official exam objectives and dedicating time to understanding each topic area will help you identify your strengths and weaknesses, increasing your chances of passing on the first attempt.

Ready to start learning? Individual Plans →Team Plans →