- +1 855.488.5327
- customerservice@ituonline.com
- Mon - Fri: 9:00am - 5:00pm ET
CompTIA Network Vulnerability Assessment Professional (CNVP)
The CompTIA CNVP is an invaluable certification specifically crafted for IT professionals with 2 to 5 years of experience. This stackable program provides the course materials required to not only earn your Security+ and PenTest+ certifications, but also allows you to excel in your knowledge as a cybersecurity specialist.
Included In This Course
Included In This Course
50 Training Hours
230 On-demand Videos
Closed Captions
38 Topics
395 Prep Questions
Certificate of Completion
Course Description
Master CompTIA Certification: Super Sale In Process12 Courses to Boost Your IT Career
You can get these courses and more in our Master CompTIA Certification training series. The Master CompTIA training series contains 12 courses and is available for a limited time at an exceptionally low price. Now on sale for a limited time. Get serious about your training and elevate your career!
The CompTIA CNVP is a stackable certification by CompTIA. It is designed for IT professionals and Operations Specialist with 2 to 5 years of experience. The ITU Certification Path for the CompTIA CNVP certification consists of the learning materials to allow you to study for and pass the CompTIA Security+ and CompTIA PenTest+ certification exams.
Completing this path and passing the two certification exam means you end of with two CompTIA certifications and are a designated a CompTIA Network Vulnerability Assessment Professional (CNVP).
The two courses contained in this path are:
- CompTIA Security+
- CompTIA PenTest+
Upon successfully passing the applicable exams provided by CompTIA, you will earn the CNVP certification badge.
For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.
Frequently Asked Questions About CompTIA Network Vulnerability Assessment Professional (CNVP)
What is the CompTIA CNVP certification?
The CompTIA CNVP (Network Vulnerability Assessment Professional) is a stackable certification specifically designed for IT professionals with 2 to 5 years of experience. The certification equips learners with the knowledge and skills required to scan applications and systems to identify vulnerabilities, enhancing their expertise as cybersecurity specialists.
What courses are included in the ITU’s CompTIA CNVP certification path?
The ITU’s CompTIA CNVP certification path includes two courses: CompTIA Security+ and CompTIA PenTest+. Successfully passing the exams associated with these courses qualifies you as a CompTIA Network Vulnerability Assessment Professional.
What skills will I acquire from the CompTIA CNVP certification?
The CompTIA CNVP certification covers a broad range of skills, including Access Control, Application Security, Cryptography, Network Security, Penetration Testing, Reconnaissance, Risk Management, Security Exploits, and Vulnerability Assessment.
How many hours of training does the ITU’s CompTIA CNVP certification path provide?
The ITU’s CompTIA CNVP certification path provides 55 hours of training, which includes 296 videos covering 27 topics and 498 practice questions.
How can I access the CompTIA CNVP certification path training on ITU Online?
You can access the CompTIA CNVP certification path training and over 2,500 hours of on-demand content with the ITU’s All Access Monthly Subscription. You can start with a 7-day free trial, and there’s no obligation to continue; you can cancel anytime.
What are the prerequisites for earning the CompTIA CNVP certification?
To earn the CompTIA CNVP certification, you need to pass the exams for the CompTIA Security+ and CompTIA PenTest+ certifications.
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Course Outline
CompTIA Security+ SY0-601 (2022) Course Content
Module 1 - Introduction to Security
1.1 Introduction to Security
Module 2 - Malware and Social Engineering Attacks
2.1 Malware and Social Engineering Attacks
Module 3 - Basic Cryptography
3.1 Basic Cryptography
Module 4 - Advanced Cryptography and PKI
4.1 Advanced Cryptography and PKI
Module 5 - Networking and Server Attacks
5.1 Networking and Server Attacks
Module 6 - Network Security Devices, Designs and Technology
6.1 Network Security Devices, Designs and Technology
Module 7 - Administering a Secure Network
7.1 Administering a Secure Network
Module 8 - Wireless Network Security
8.1 Wireless Network Security
Module 9 - Client and Application Security
9.1 Client and Application Security
Module 10 - Mobile and Embedded Device Security
10.1 Mobile and Embedded Device Security
Module 11 - Authentication and Account Management
11.1 Authentication and Account Management
Module 12 - Access Management
12.1 Access Management
Module 13 - Vulnerability Assessment and Data Security
13.1 Vulnerability Assessment and Data Security
Module 14 - Business Continuity
14.1 Business Continuity
Module 15 - Risk Mitigation
15.1 Risk Mitigation
Module 16 - Security Plus Summary and Review
16.1 - Security Plus Summary and Review
Module 17 - Hands-On Training
17.1 Hands-On Scanning Part 1
17.2 Hands-On Scanning Part 2
17.3 Hands-On Advanced Scanning
17.4 Hands-On MetaSploit
17.5 Hands-On BurpSuite
17.6 Hands-On Exploitation Tools Part 1
17.7 Hands-On Exploitation Tools Part 2
17.8 Hands-On Invisibility Tools
17.9 Hands-On Connect to Tor
CompTIA PenTest+ (PT0-001) Course Content
Module 1 - The Pen Test Engagement
Module 1 Notes
1.0 PenTest Plus Introduction
1.1 PenTest Plus Topics
1.2 PenTest Engagement
1.3 Threat Modeling
1.4 Technical Constraints
1.5 PenTest Engagement Review
1.6 Examining PenTest Engagement Documents Act
Module 2 - Passive Reconnaissance
Module 2 Notes
2.1 Passive Reconnaissance part1
2.2 WHOIS Act
2.3 Passive Reconnaissance part2
2.4 Google Hacking Act
2.5 Passive Reconnaissance part3
2.6 DNS Querying Act
2.7 Passive Reconnaissance part4
2.8 Email Server Querying Act
2.9 SSL-TLS Cerfificates
2.10 Shodan Act
2.11 The Havester
2.12 TheHarvester Act
2.13 Recon-ng
2.14 Recon-g Act
2.14 Recon-ng-Part-2-API-key Act
2.15 Maltego
2.16 Have I been Pwned
2.17 Punked and Owned Pwned Act
2.18 Fingerprinting Organization with Collected Archives
2.19 FOCA Act
2.20 Findings Analysis Weaponization
2.21 Chp 2 Review
Module 3 - Active Reconnaissance
Module 3 Notes
3.1 Active Reconnaissannce
3.2 Discovery Scans Act
3.3 Nmap
3.4 Nmap Scans Types Act
3.5 Nmap Options
3.6 Nmap Options Act
3.7 Stealth Scans
3.8 Nmap Stealth Scans Act
3.9 Full Scans
3.10 Full Scans Act
3.11 Packet Crafting
3.12 Packet Crafting Act
3.13 Network Mapping
3.14 Metasploit
3.15 Scanning with Metasploit Act
3.16 Enumeration
3.17 Banner Grabbing Act
3.18 Windows Host Enumeration
3.19 Winddows Host Enumeration Act
3.20 Linux Host Enumeration
3.21 Linux Host Enumeration Act
3.22 Service Enumeration
3.23 Service Enumeration Act
3.24 Network Shares
3.25 SMB Share Enumeration Act
3.26 NFS Network Share Enumeration
3.27 NFS Share Enumeration Act
3.28 Null Sessions
3.29 Null Sessions Act
3.30 Website Enumeration
3.31 Website Enumeration Act
3.32 Vulnerability Scans
3.33 Compliance Scans Act
3.34 Credentialed Non-credentialed Scans
3.35 Using Credentials in Scans Act
3.36 Server Service Vulnerability Scan
3.37 Vulnerability Scanning Act
3.38 Web Server Database Vulnerability Scan
3.39 SQL Vulnerability Scanning Act
3.40 Vulnerability Scan Part 2 OpenVAS Act
3.41 Web App Vulnerability Scan
3.42 Web App Vulnerability Scanning Act
3.43 Network Device Vulnerability Scan
3.44 Network Device Vuln Scanning Act
3.45 Nmap Scripts
3.46 Using Nmap Scripts for Vuln Scanning Act
3.47 Packet Crafting for Vulnerbility Scans
3.48 Firewall Vulnerability Scans
3.49 Wireless Access Point Vunerability
3.50 Wireless AP Scans Act
3.51 WAP Vulnerability Scans
3.52 Container Security issues
3.53 How to Update Metasploit Pro Expired Trial License
Module 4 - Physical Security
Module 4 Notes
4.1 Physical Security
4.2 Badge Cloning Act
4.3 Physical Security Review
Module 5 - Social Engineering
Module 5 Notes
5.1 Social Engineering
5.2 Using Baited USB Stick Act
5.3 Using Social Enginnering to Assist Attacks
5.4 Phishing Act
5.5 Social Engineering Review
Module 6 - Vulnerability Scan Analysis
Module 6 Notes
6.1 Vulnerbility Scan Analysis
6.2 Validating Vulnerability Scan Results Act
6.3 Vulnerbility Scan Analysis Review
Module 7 - Password Cracking
Module 7 Notes
7.1 Password Cracking
7.2 Brute Force Attack Against Network Service Act
7.3 Network Authentication Interception Attack
7.4 Intercepting Network Authentication Act
7.5 Pass the Hash Attacks
7.6 Pass the Hash Act
7.7 Password Cracking Review
Module 8 - Penetrating Wired Networks
Module 8 Notes
8.1 Penetrating Wired Network
8.2 Sniffing Act
8.3 Eavesdropping
8.4 Eavesdropping Act
8.5 ARP Poisoning
8.6 ARP Poisoning Act
8.7 Man In The Middle
8.8 MITM Act
8.9 TCP Session HiJacking
8.10 Server Message Blocks SMB Exploits
8.11 SMB Attack Act
8.12 Web Server Attacks
8.13 FTP Attacks
8.14 Telnet Server Attacks
8.15 SSH Server Attacks
8.16 Simple Network Mgmt Protocol SNMP
8.17 Simple Mail Transfer Protocol SMTP
8.18 Domain Name System DNS Cache Poisoning
8.19 Denail of Service Attack DoS-DDoS
8.20 DoS Attack Act
8.21 VLAN Hopping Review
Module 9 - Penetrating Wireless Networks
Module 9 Notes
9.1 Penetrating Wireless Networks
9.2 Jamming Act
9.3 Wireless Sniffing
9.4 Replay Attacks
9.5 WEP Cracking Act
9.6 WPA-WPA2 Cracking
9.7 WAP Cracking Act
9.8 Evil Twin Attacks
9.9 Evil Twin Attack Act
9.10 WiFi Protected Setup
9.11 Bluetooth Attacks
9.12 Penetrating Wireless Networks
Module 10 - Windows Exploits
Module 10 Notes
10.1 Windows Exploits
10.2 Dumping Stored Passwords Act
10.3 Dictionary Attacks
10.4 Dictionary Attack Against Windows Act
10.5 Rainbow Table Attacks
10.6 Credential Brute Force Attacks
10.7 Keylogging Attack Act
10.8 Windows Kernel
10.9 Kernel Attack Act
10.10 Windows Components
10.11 Memory Vulnerabilities
10.12 Buffer Overflow Attack Act
10.13 Privilegde Escalation in Windows
10.14 Windows Accounts
10.15 Net and WMIC Commands
10.16 Sandboxes
Module 11 - Linux Exploits
Module 11 Notes
11.1 Linux Exploits
11.2 Exploiting Common Linux Features Act
11.3 Password Cracking in Linux
11.4 Cracking Linux Passwords Act
11.5 Vulnerability Linux
11.6 Priviledge Escalation Linux
11.7 Linux Accounts
11.8 Linux Exploits Review
Module 12 - Mobile Devices
Module 12 Notes
12.1 Mobile Devices
12.2 Hacking Android Act
12.3 Apple Exploits
12.4 Moblie Devices Review
Module 13 - Specialized Systems
Module 13 Notes
13.1 Specialized Systems
13.2 Specialized Systems Review
Module 14 - Scripts
Module 14 Notes
14.1 Scripts
14.2 Powershell
14.3 Python
14.4 Ruby
14.5 Common Scripting Elements
14.6 Scripts Review
14.7 Better Ping Sweep
14.8 Simple Port Scanner2
14.9 Multitarget Port Scanner
14.10 Port Scanner with Nmap
14.11 Scripts Review
Module 15 - Application Testing
Module 15 Notes
15.1 Application Testing
15.2 Reverse Engineering
Module 16 - Web App Exploits
Module 16 Notes
16.1 Webb App Exploits
16.2 Injection Attacks
16.3 HTML Injection
16.4 SQL Hacking - SQLmap Act
16.5 Cross-Site Attacks
16.6 Cross-Site Request Forgery
16.7 Other Web-based Attacks
16.8 File Inclusion Attacks
16.9 Web Shells
16.10 Web Shells Review
Module 17 - Lateral Movement
Module 17 Notes
17.1 Lateral Movement
17.2 Lateral Movement with Remote Mgmt Services
17.3 Process Migration Act
17.4 Passing Control Act
17.5 Pivoting
17.6 Tools the Enable Pivoting
17.7 Lateral Movement Review
Module 18 - Persistence
Module 18 Notes
18.1 Persistence
18.2 Breeding RATS Act
18.3 Bind and Reverse Shells
18.4 Bind Shells Act
18.5 Reverse Shells
18.6 Reverse Shells Act
18.7 Netcat
18.8 Netcat Act
18.9 Scheduled Tasks
18.10 Scheduled Tasks Act
18.11 Services and Domains
18.12 Persistence Review
Module 19 - Cover Your Tracks
Module 19 Notes
19.1 Cover Your Tracks
19.2 Cover Your Tracks - Timestomp Files Act
19.3 Cover Your Tracks - Frame the Administrator Act
19.4 Cover Your Tracks - Clear the Event Log Act
19.5 Cover Your Tracks Review
Module 20 - The Report
Module 20 Notes
20.1 The Report
20.2 The Report Review
Module 21 - Post Engagement Cleanup
Module 21 Notes
21.1 Post Engagement Cleanup_1
21.3 Post Engagement Cleanup Review
21.4 PenTest Plus Conclusion.mp4
Add a review
Rating*
0/5
* Rating is required
Your review
* Review is required
Name
* Name is required
Email
* Email is required
1-5 of 49 reviews
Sorry, no reviews match your current selections
Your Training Instructors
Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.
When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.
Chrys lives by, and is fond of repeating, her professional creed:
“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”
Professor Brian O'Hare has over 25 years of experience in the IT industry. He started off in web design as a Corporate Webmaster but wanted to understand how the internet worked. While working towards his bachelor’s in computer science, he studied and got his MCSE (Microsoft Certified Systems Engineer) and his MCT (Microsoft Certified Trainer). Once certified he paid for his degree working as a Network Engineer and then a Trainer for others wanting to learn about Microsoft’s Desktop and Server products.
$59.00
OR
Subscribe To All-Access
Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.
$49.00 $14.99 Monthly
CompTIA Network Vulnerability Assessment Professional (CNVP)
CompTIA Network Vulnerability Assessment Professional (CNVP)
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
7 Days Free - $39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
Related Courses
$49.00
Become a cloud computing expert with our CompTIA training for Cloud+ CVO-002 online certification course. Enroll now to enhance your cloud computing skills and the knowledge needed to advance your career.
In this course you will learn to manage the cost, deploy, adhere to compliance, and secure a Cloud-based network. This course is ideal for IT personnel who focus on infrastructure, those who are interested in becoming Cloud practitioners, IT project managers who manage migrations, and IT managers who need a further understanding of Cloud technologies.
$59.00
Become a certified CompTIA Secure Cloud Professional (CSCP) with ITU Online’s online training course. Gain the expertise to manage cloud security.
In this IT course you will learn a thorough understanding of the information security risks and mitigation strategies critical to data security in the Cloud. This CompTIA IT course will teach you strategies for protecting data at rest and data in motion as well as strategies for safe-guarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations.
$59.00
Master IT operations and change management to become a CompTIA IT Operations Specialist (CIOS). Enroll in the online course and start your career journey today.
CompTIA CIOS is an invaluable stackable certification by CompTIA, specifically tailored for IT professionals with up to two years of experience. This remarkable path comprises learning materials that will help you pass the CompTIA A+ and Network+ exams—allowing you to make your mark as a certified professional in no time!
I was looking for an online course for Six Sigma as my new boss is a true believer and I wanted to have a better handle of what is Six Sigma. I started looking around and found ITU, and bought the course, and could not be happier. I have no intention of getting certified, but at least now I can speak the jargon and understand what my boss is talking about.
The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.
The CompTIA PenTest was an excellent course and the instructor, Chrys, explained the material in a clear and easy way for me to understand and comprehend essential techniques. Highly recommend!
This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.