CompTIA Penetration Testing (PenTest+)
Grow your cybersecurity skills with this CompTIA Penetration Testing (PenTest+) course.
Learn More
Docnito's 2 Month Course
Ready for a new start? This course includes 135 hours of training and is worth 9 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.
Why Take a Cyber security Course?
This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.
Why Choose Docnito?
- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.
- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.
- Our courses are 100% online, which means you never have to leave home to attend classes!
About This Course
Learn the Fundamentals in Just 2 Months!
Program Details
WHAT YOU WILL LEARN
Upon successful completion of this course, the students will be able to plan and scope penetration tests by defining rules of engagement, selecting targets, and establishing testing timelines. They will ensure legal and ethical compliance through proper authorization and adherence to relevant regulations. Students will communicate effectively with stakeholders, conduct peer reviews, and articulate risk clearly. They will perform both active and passive reconnaissance using OSINT, network sniffing, and tools like Nmap, Wireshark, and Shodan. Students will apply enumeration techniques and customize scripts in Python, PowerShell, and Bash for reconnaissance. They will carry out vulnerability scans (authenticated/unauthenticated, SAST/DAST), analyze results, and validate findings using tools like Nessus, Nikto, and OpenVAS. The course covers a range of attack methods, including network, authentication, host-based, web application, and cloud-based attacks, as well as emerging threats targeting AI systems. Students will engage in post-exploitation activities such as persistence, lateral movement, and cleanup, and will document attack narratives with remediation recommendations.
Tuition
Check out our tuition page to see how our credits and tuition work.
Requirements
This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.
Curriculum
Chapter 1: Penetration Testing: Before You Begin
Chapter 2: Applying Pre-Engagement Activities
Chapter 3: Enumeration and Reconnaissance
Chapter 4: Scanning and Identifying Vulnerabilities
Chapter 5: Conducting PenTest Attacks
Chapter 6: Web-Based Attacks
Chapter 7: Enterprise Attacks
Chapter 8: Specialized Attacks
Chapter 9: Performing Penetration Testing Tasks
Chapter 10: Reporting and Recommendations
Chapter 11: Final Exam