CompTIA PenTest+
computer Online: 13. Apr 2026 bis 17. Apr 2026 |
placeStuttgart 13. Apr 2026 bis 17. Apr 2026 |
placeZürich 13. Apr 2026 bis 17. Apr 2026 |
computer Online: 20. Apr 2026 bis 24. Apr 2026 |
placeBerlin 20. Apr 2026 bis 24. Apr 2026 |
placeHamburg 20. Apr 2026 bis 24. Apr 2026 |
computer Online: 27. Apr 2026 bis 1. Mai 2026 |
computer Online: 11. Mai 2026 bis 15. Mai 2026 |
computer Online: 18. Mai 2026 bis 22. Mai 2026 |
placeFrankfurt 18. Mai 2026 bis 22. Mai 2026 |
placeKöln 18. Mai 2026 bis 22. Mai 2026 |
placeMadrid 18. Mai 2026 bis 22. Mai 2026 |
computer Online: 25. Mai 2026 bis 29. Mai 2026 |
computer Online: 15. Jun 2026 bis 19. Jun 2026 |
placeStuttgart 15. Jun 2026 bis 19. Jun 2026 |
placeZürich 15. Jun 2026 bis 19. Jun 2026 |
computer Online: 22. Jun 2026 bis 26. Jun 2026 |
placeAugsburg 22. Jun 2026 bis 26. Jun 2026 |
placeGraz 22. Jun 2026 bis 26. Jun 2026 |
placeInnsbruck 22. Jun 2026 bis 26. Jun 2026 |
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabili…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyse tool output or data related to a penetration test
- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
