CompTIA PenTest + PT0-001 : Master Pentesting - ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

CompTIA PenTest + PT0-001 : Master Pentesting

Master penetration testing skills to identify security weaknesses, conduct comprehensive cyberattack simulations, and enhance organizational defenses for aspiring cybersecurity professionals.


34 Hrs 24 Min215 Videos249 Questions49,473 EnrolledCertificate of CompletionClosed Captions

CompTIA PenTest + PT0-001 : Master Pentesting



If you want to identify security weaknesses before malicious actors do, mastering comptia pentest skills is essential. This course equips you with the practical expertise needed to conduct comprehensive penetration tests, simulate cyberattacks, and help organizations bolster their defenses. You’ll learn to approach security assessments systematically, from planning to reporting, applying industry-standard tools and techniques along the way.

This training covers the core areas of the CompTIA PenTest+ (PT0-001) certification, focusing on hands-on skills that translate directly to real-world scenarios. Topics include reconnaissance, vulnerability analysis, exploitation, and post-engagement cleanup. You’ll gain confidence in using tools like Nmap, Metasploit, and Wireshark, enabling you to uncover vulnerabilities and provide actionable insights. What sets this course apart is its emphasis on practical application—preparing you not just for the exam, but for the challenges faced daily in cybersecurity roles.

What You Will Learn

In this course, you will develop a thorough understanding of penetration testing methodologies and how to apply them effectively. You will be able to:

  • Plan and scope a penetration test, including defining goals and understanding legal considerations.
  • Perform passive reconnaissance using tools like WHOIS, Shodan, and Maltego to gather information without alerting targets.
  • Utilize active reconnaissance techniques such as Nmap scans, banner grabbing, and service enumeration to identify live hosts and open ports.
  • Assess physical security vulnerabilities, including badge cloning and physical access testing.
  • Design and implement social engineering attacks, including phishing campaigns and baiting tactics.
  • Analyze vulnerability scan results to prioritize security weaknesses needing remediation.
  • Apply password cracking techniques, such as brute-force and dictionary attacks, to evaluate password strength.
  • Conduct network penetration testing on wired and wireless networks, including ARP poisoning and Wi-Fi cracking methods.
  • Exploit common vulnerabilities in Windows and Linux systems, escalating privileges to demonstrate security gaps.
  • Identify and exploit web application vulnerabilities like SQL injection and cross-site scripting (XSS).

Who This Course Is For

This course is ideal for IT professionals aiming to deepen their penetration testing skills, including:

  • Entry- to mid-level cybersecurity analysts seeking hands-on experience in penetration testing.
  • Network administrators and security engineers responsible for defending organizational assets.
  • Students or recent graduates in computer science, cybersecurity, or related fields looking to start a career in pentesting.
  • Professionals transitioning from other IT roles into security, wanting practical skills that directly impact their organization’s security posture.

Why These Skills Matter

Developing proficiency in comptia pentest techniques positions you as a critical player in any organization’s security team. These skills enable you to proactively identify vulnerabilities, simulate real-world attack scenarios, and provide strategic recommendations to prevent breaches. Employers value professionals who can think like attackers, because it helps them stay ahead of emerging threats. Completing this course and earning the certification can open doors to advanced cybersecurity roles, higher salaries, and increased job security in a competitive market.

Module 1 – The Pen Test Engagement
  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review
Module 5 – Social Engineering
  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes
Module 11 – Linux Exploits
  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review
Module 12 – Mobile Devices
  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review
Module 13 – Specialized Systems
  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review
Module 14 – Scripts
  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review
Module 15 – Application Testing
  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering
Module 16 – Web App Exploits
  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review
Module 17 – Lateral Movement
  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review
Module 18 – Persistence
  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review
Module 19 – Cover Your Tracks
  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review
Module 20 – The Report
  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review
Module 21 – Post Engagement Cleanup
  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

[ FAQ ]

Frequently Asked Questions.

What is the scope of the CompTIA PenTest+ PT0-001 certification exam?

The CompTIA PenTest+ PT0-001 exam is designed to validate a candidate’s skills in penetration testing and vulnerability assessment. It covers a broad range of domains including planning and scoping, information gathering and vulnerability identification, attacks and exploits, post-exploitation techniques, and reporting and communication.

The exam assesses practical knowledge of tools like Nmap, Metasploit, Wireshark, and others, as well as understanding legal and ethical considerations involved in penetration testing. It emphasizes real-world scenarios, requiring candidates to demonstrate the ability to conduct comprehensive assessments of network, web, and physical security. Achieving this certification signals that a professional is capable of identifying security weaknesses proactively and providing actionable remediation strategies.

What are the key topics covered in the CompTIA PenTest+ (PT0-001) training course?

This course covers essential topics aligned with the PT0-001 exam, including reconnaissance techniques (passive and active), vulnerability analysis, and exploitation of network and web application vulnerabilities. It also emphasizes post-exploitation procedures, such as privilege escalation and data exfiltration, alongside methods for reporting and communication.

Additional focus areas include physical security testing, social engineering tactics like phishing and baiting, password cracking techniques, wireless network assessments, and exploitation of common vulnerabilities in Windows and Linux environments. Hands-on exercises using industry-standard tools ensure learners can apply these skills effectively in real-world scenarios, preparing them thoroughly for the certification exam and cybersecurity challenges.

How does mastering the CompTIA PenTest+ (PT0-001) certification benefit my cybersecurity career?

Achieving the CompTIA PenTest+ certification enhances your credibility as a cybersecurity professional with practical penetration testing skills. It positions you as a valuable asset in organizations seeking proactive security assessment capabilities, helping to identify and mitigate vulnerabilities before attackers can exploit them.

This certification opens doors to advanced roles such as penetration tester, security analyst, or vulnerability analyst. Employers highly value hands-on expertise in assessing security weaknesses across networks, web applications, and physical environments. Additionally, the skills gained can lead to higher salaries, better job security, and opportunities to work on challenging security projects that have a real impact on organizational defense strategies.

What preparation strategies are recommended for passing the CompTIA PenTest+ PT0-001 exam?

Effective preparation involves a combination of theoretical study and practical experience. Start by thoroughly reviewing the exam objectives and focusing on key domains such as reconnaissance, vulnerability assessment, and exploitation techniques. Hands-on labs using tools like Nmap, Metasploit, and Wireshark are crucial to develop real-world skills.

Utilize practice exams and simulation tests to familiarize yourself with the question format and time management. Additionally, engaging in penetration testing projects or lab environments can reinforce learning and build confidence. Studying the official CompTIA PenTest+ resources, such as study guides and online courses, will ensure comprehensive coverage of all exam topics, increasing your chances of success.

What are the differences between the CompTIA PenTest+ (PT0-001) and other cybersecurity certifications like CEH or OSCP?

The CompTIA PenTest+ (PT0-001) focuses on practical penetration testing skills with an emphasis on a broad understanding of security assessment methodologies, legal considerations, and reporting. It is vendor-neutral and designed for mid-level cybersecurity professionals seeking a hands-on yet approachable certification.

In comparison, the Certified Ethical Hacker (CEH) from EC-Council tends to focus more on understanding hacking techniques and tools from an attacker’s perspective, often with a theoretical emphasis. The Offensive Security Certified Professional (OSCP) by Offensive Security is highly practical, requiring candidates to complete a rigorous hands-on exam involving real-world penetration tests within a lab environment. Each certification has its unique strengths, with PenTest+ serving as a solid foundation and OSCP being more advanced for active penetration testers.

Ready to start learning? Individual Plans →Team Plans →