CompTIA Penetration Testing (PenTest+)

Grow your cybersecurity skills with this CompTIA Penetration Testing (PenTest+) course. 

Learn More

Docnito's 2 Month Course

Ready for a new start? This course includes 135 hours of training and is worth 9 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.

Why Take a Cyber security Course?

This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.

Why Choose Docnito?

- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.

- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.

- Our courses are 100% online, which means you never have to leave home to attend classes!

About This Course

Learn the Fundamentals in Just 2 Months!

WHAT YOU WILL LEARN

Upon successful completion of this course, the students will be able to plan and scope penetration tests by defining rules of engagement, selecting targets, and establishing testing timelines. They will ensure legal and ethical compliance through proper authorization and adherence to relevant regulations. Students will communicate effectively with stakeholders, conduct peer reviews, and articulate risk clearly. They will perform both active and passive reconnaissance using OSINT, network sniffing, and tools like Nmap, Wireshark, and Shodan. Students will apply enumeration techniques and customize scripts in Python, PowerShell, and Bash for reconnaissance. They will carry out vulnerability scans (authenticated/unauthenticated, SAST/DAST), analyze results, and validate findings using tools like Nessus, Nikto, and OpenVAS. The course covers a range of attack methods, including network, authentication, host-based, web application, and cloud-based attacks, as well as emerging threats targeting AI systems. Students will engage in post-exploitation activities such as persistence, lateral movement, and cleanup, and will document attack narratives with remediation recommendations.

Check out our tuition page to see how our credits and tuition work.

This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.

Chapter 1: Penetration Testing: Before You Begin

Chapter 2: Applying Pre-Engagement Activities

Chapter 3: Enumeration and Reconnaissance

Chapter 4: Scanning and Identifying Vulnerabilities

Chapter 5: Conducting PenTest Attacks

Chapter 6: Web-Based Attacks

Chapter 7: Enterprise Attacks

Chapter 8: Specialized Attacks

Chapter 9: Performing Penetration Testing Tasks

Chapter 10: Reporting and Recommendations

Chapter 11: Final Exam

Start Your Training Today!