SlideShare a Scribd company logo
1 of 26
Download to read offline
Meet the
panel
Director, Certification Product Management
CompTIA
Jeff Peters
Director of Content Marketing
Infosec
Patrick Lane
Today’s
webcast
➢ Industry changes
➢ CompTIA PenTest+ (PT0-002) overview
➢ CompTIA career pathway
➢ PenTest+ PT0-002 exam changes
➢ CompTIA training resources
➢ Q&A
Free resources
Free resources from CompTIA
and Infosec
Downloads
CompTIA cybersecurity career pathway
CompTIA PenTest+ exam outline
Webinars
Network+
Security+
CySA+
CASP+
Industry changes
State of cybersecurity: A global view
Hacking accounts for over half of all recent data breaches; phishing is the second biggest
risk. Not surprisingly, 70% of breaches are financially motivated, with 43% of breaches
involving exploiting vulnerabilities in web applications.
Growth: Globally, the penetration testing market size is expected to grow from $1.6B to
$3B by 2026, a 13.8% growth rate
Opportunities: Cloud-based pentesting involving continuous testing and remediation
Challenge: Rising regulations and compliances mandating pentesting and costs, rising
sophistication of cyberattacks and increased internet/mobile-based apps penetration
Biggest challenge: Lack of skilled cybersecurity professionals to conduct testing
Biggest shortage of cybersecurity skills: Penetration testing/red teaming are within
the top 10
Most impactful for improving working relationship between security teams and
business management: More penetration testing and sharing results to
understand cyber risks are within the top 10
CompTIA PenTest+ overview
What is CompTIA PenTest+?
CompTIA PenTest+ is for cybersecurity professionals tasked
with penetration testing and vulnerability management
PenTest+ is the most comprehensive exam covering all red
team activities
It is the only exam on the market to include all aspects of
vulnerability management
PT0-002 is the most current penetration testing exam covering
the latest techniques against expanded attack surfaces
CompTIA PenTest+ launched October 28, 2021
CompTIA PenTest+ certification
Plan and scope a penetration testing engagement
Understand legal and compliance requirements
Perform vulnerability scanning and penetration testing using appropriate tools
and techniques, and then analyze the results
Produce a written report containing proposed remediation techniques, effectively
communicate results to the management team and provide practical
recommendations
The CompTIA PenTest+ certification exam will verify the successful candidate has the
knowledge and skills required to: 
PenTest+ candidate profile
Primary job roles
➢ Penetration tester
➢ Security consultant
Secondary job roles
➢ Cloud penetration tester
➢ Cloud security specialist
➢ Network & security specialist
➢ Web app penetration tester
➢ Information security engineer
➢ Security analyst
Recommended experience
➢ 3–4 years of hands-on experience
performing penetration tests,
vulnerability assessments and
code analysis
➢ Network+, Security or equivalent
certifications / knowledge
Accreditation and approvals
Approved under the DoD Directive 8140/8570.01-M
The directive requires DoD Information Assurance (IA) workers who work with sensitive data to
obtain a commercial certification accredited under ISO standard 17024. The three approved
8570.01-M work roles for PenTest+ are:
➢ Cybersecurity Service Provider (CSSP) Analyst
➢ CSSP Incident Responder
➢ CSSP Auditor
PenTest+ also maps to 7 DCWF/NICE Framework work roles at over 70%
This positions PenTest+ for the eventual DoD 8140 manual, expected in late 2021
➢ Security Control Assessor (612)
➢ Cyber Defense Analyst (511)
➢ Cyber Defense Infrastructure Support Specialist (521)
➢ Cyber Defense Incident Responder (531)
➢ Vulnerability Assessment Analyst (541)
➢ Forensics Analyst (211)
➢ Cyber Defense Forensics Analyst (212)
CompTIA career pathway
CompTIA certifications align with the skill sets needed to support and manage IT
infrastructure. Enter where appropriate for you. Consider your experience and existing
certifications or course of study.
PenTest+ PT0-002 exam
Exam objectives: What’s new?
Same number of exam domains (5) with similar titles
Fewer objectives: 21 versus 24 due to consolidation of PT0-001
objectives to improve instructional design and merge similar topics
80% of topics are similar, 20% are updated to include:
Expanded techniques for pentesting web applications, cloud and hybrid
environments.
Emphasis on demonstrating an ethical hacking mindset given various scenarios.
More focus on vulnerability scanning. For example, Domain 2.0 renamed from
“…Vulnerability Identification” to “…Vulnerability Scanning” to emphasize
hands-on scanning skills.
More focus on code analysis: The previous Domain 4 Penetration Testing Tools
was renamed / reordered to Domain 5 Tools and Code Analysis to emphasize
the growing need to identify and analyze code during a penetration test. (Code
development is not required.)
Exam domains: What's new?
PT0-002 PT0-001
Exam domains % Exam domains %
1.0 Planning and scoping 14% 1.0 Planning and scoping 15%
2.0 Information gathering and vulnerability
scanning
22% 2.0 Information gathering and vulnerability
identification
22%
3.0 Attacks and exploits 30% 3.0 Attacks and exploits 30%
4.0 Reporting and communication 18% 5.0 Reporting and communication 16%
5.0 Tools and code analysis 16% 4.0 Penetration testing tools 17%
1.0 Planning and scoping
PT0-002 New objectives
1.1 Compare and contrast governance, risk, and compliance concepts.
1.2 Explain the importance of scoping and organizational/customer requirements.
1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism
and integrity.
2.0 Information gathering and vulnerability scanning
PT0-002 New objectives
2.1 Given a scenario, perform passive reconnaissance.
2.2 Given a scenario, perform active reconnaissance.
2.3 Given a scenario, analyze the results of a reconnaissance exercise.
2.4 Given a scenario, perform vulnerability scanning.
3.0 Attacks and exploits
PT0-002 New objectives
3.1 Given a scenario, research attack vectors and perform network attacks.
3.2 Given a scenario, research attack vectors and perform wireless attacks.
3.3 Given a scenario, research attack vectors and perform application-based attacks.
3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies
3.5 Explain common attacks and vulnerabilities against specialized systems.
3.6. Given a scenario, perform a social engineering or physical attack.
3.7 Given a scenario, perform post-exploitation techniques.
4.0 Reporting and communication
PT0-002 New objectives
4.1 Compare and contrast important components of written reports.
4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a
report.
4.3 Explain the importance of communication during the penetration testing process.
4.4 Explain post-report delivery activities.
5.0 Tools and code analysis
PT0-002 New objectives
5.1 Explain the basic concepts of scripting and software development.
5.2 Given a scenario, analyze a script or code sample for use in a penetration test.
5.3 Explain use cases of the following tools during the phases of a penetration test.
CompTIA training resources
Get certified with Infosec Skills
Train for your CompTIA certification with Infosec Skills:
Infosec Skills subscription:
➢ 130+ role-based learning paths (e.g., ITF+, A+, Network+,
Security+, CySA+ PenTest+, CASP+)
➢ 100s of hands-on labs in cloud-hosted cyber ranges
➢ Custom certification practice exams and skill assessments
Infosec Skills live boot camp:
➢ Live, instructor-led training (in-person or live online)
➢ Certification exam voucher
➢ 90 day extended access to recordings of daily lessons, plus
all materials in Infosec Skills
➢ Exam Pass Guarantee
infosecinstitute.com/skills
Get certified with Infosec Skills
And the winner for a
one-year subscription to
Infosec Skills is …
infosecinstitute.com/skills
(Valued at $299)
Questions?
About us
Infosec believes knowledge is power when fighting
cybercrime. We help IT and security professionals advance
their careers with  skills development and certifications
while empowering all employees with security awareness
and privacy training to stay cyber-safe at work and home.
www.infosecinstitute.com

More Related Content

What's hot

Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 

What's hot (20)

Security and management
Security and managementSecurity and management
Security and management
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Incident response
Incident responseIncident response
Incident response
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 

Similar to CompTIA PenTest+: Everything you need to know about the exam

CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
sombat nirund
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
Jason Chapman
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
Calvin Sam
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 

Similar to CompTIA PenTest+: Everything you need to know about the exam (20)

PenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certificationPenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certification
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Introduction to comp tia pentest+
Introduction to comp tia pentest+Introduction to comp tia pentest+
Introduction to comp tia pentest+
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 

More from Infosec

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessment
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 

Recently uploaded

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

CompTIA PenTest+: Everything you need to know about the exam

  • 1.
  • 2. Meet the panel Director, Certification Product Management CompTIA Jeff Peters Director of Content Marketing Infosec Patrick Lane
  • 3. Today’s webcast ➢ Industry changes ➢ CompTIA PenTest+ (PT0-002) overview ➢ CompTIA career pathway ➢ PenTest+ PT0-002 exam changes ➢ CompTIA training resources ➢ Q&A
  • 4. Free resources Free resources from CompTIA and Infosec Downloads CompTIA cybersecurity career pathway CompTIA PenTest+ exam outline Webinars Network+ Security+ CySA+ CASP+
  • 6. State of cybersecurity: A global view Hacking accounts for over half of all recent data breaches; phishing is the second biggest risk. Not surprisingly, 70% of breaches are financially motivated, with 43% of breaches involving exploiting vulnerabilities in web applications. Growth: Globally, the penetration testing market size is expected to grow from $1.6B to $3B by 2026, a 13.8% growth rate Opportunities: Cloud-based pentesting involving continuous testing and remediation Challenge: Rising regulations and compliances mandating pentesting and costs, rising sophistication of cyberattacks and increased internet/mobile-based apps penetration Biggest challenge: Lack of skilled cybersecurity professionals to conduct testing Biggest shortage of cybersecurity skills: Penetration testing/red teaming are within the top 10 Most impactful for improving working relationship between security teams and business management: More penetration testing and sharing results to understand cyber risks are within the top 10
  • 8. What is CompTIA PenTest+? CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management PenTest+ is the most comprehensive exam covering all red team activities It is the only exam on the market to include all aspects of vulnerability management PT0-002 is the most current penetration testing exam covering the latest techniques against expanded attack surfaces CompTIA PenTest+ launched October 28, 2021
  • 9. CompTIA PenTest+ certification Plan and scope a penetration testing engagement Understand legal and compliance requirements Perform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the results Produce a written report containing proposed remediation techniques, effectively communicate results to the management team and provide practical recommendations The CompTIA PenTest+ certification exam will verify the successful candidate has the knowledge and skills required to: 
  • 10. PenTest+ candidate profile Primary job roles ➢ Penetration tester ➢ Security consultant Secondary job roles ➢ Cloud penetration tester ➢ Cloud security specialist ➢ Network & security specialist ➢ Web app penetration tester ➢ Information security engineer ➢ Security analyst Recommended experience ➢ 3–4 years of hands-on experience performing penetration tests, vulnerability assessments and code analysis ➢ Network+, Security or equivalent certifications / knowledge
  • 11. Accreditation and approvals Approved under the DoD Directive 8140/8570.01-M The directive requires DoD Information Assurance (IA) workers who work with sensitive data to obtain a commercial certification accredited under ISO standard 17024. The three approved 8570.01-M work roles for PenTest+ are: ➢ Cybersecurity Service Provider (CSSP) Analyst ➢ CSSP Incident Responder ➢ CSSP Auditor PenTest+ also maps to 7 DCWF/NICE Framework work roles at over 70% This positions PenTest+ for the eventual DoD 8140 manual, expected in late 2021 ➢ Security Control Assessor (612) ➢ Cyber Defense Analyst (511) ➢ Cyber Defense Infrastructure Support Specialist (521) ➢ Cyber Defense Incident Responder (531) ➢ Vulnerability Assessment Analyst (541) ➢ Forensics Analyst (211) ➢ Cyber Defense Forensics Analyst (212)
  • 12. CompTIA career pathway CompTIA certifications align with the skill sets needed to support and manage IT infrastructure. Enter where appropriate for you. Consider your experience and existing certifications or course of study.
  • 14. Exam objectives: What’s new? Same number of exam domains (5) with similar titles Fewer objectives: 21 versus 24 due to consolidation of PT0-001 objectives to improve instructional design and merge similar topics 80% of topics are similar, 20% are updated to include: Expanded techniques for pentesting web applications, cloud and hybrid environments. Emphasis on demonstrating an ethical hacking mindset given various scenarios. More focus on vulnerability scanning. For example, Domain 2.0 renamed from “…Vulnerability Identification” to “…Vulnerability Scanning” to emphasize hands-on scanning skills. More focus on code analysis: The previous Domain 4 Penetration Testing Tools was renamed / reordered to Domain 5 Tools and Code Analysis to emphasize the growing need to identify and analyze code during a penetration test. (Code development is not required.)
  • 15. Exam domains: What's new? PT0-002 PT0-001 Exam domains % Exam domains % 1.0 Planning and scoping 14% 1.0 Planning and scoping 15% 2.0 Information gathering and vulnerability scanning 22% 2.0 Information gathering and vulnerability identification 22% 3.0 Attacks and exploits 30% 3.0 Attacks and exploits 30% 4.0 Reporting and communication 18% 5.0 Reporting and communication 16% 5.0 Tools and code analysis 16% 4.0 Penetration testing tools 17%
  • 16.
  • 17. 1.0 Planning and scoping PT0-002 New objectives 1.1 Compare and contrast governance, risk, and compliance concepts. 1.2 Explain the importance of scoping and organizational/customer requirements. 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.
  • 18. 2.0 Information gathering and vulnerability scanning PT0-002 New objectives 2.1 Given a scenario, perform passive reconnaissance. 2.2 Given a scenario, perform active reconnaissance. 2.3 Given a scenario, analyze the results of a reconnaissance exercise. 2.4 Given a scenario, perform vulnerability scanning.
  • 19. 3.0 Attacks and exploits PT0-002 New objectives 3.1 Given a scenario, research attack vectors and perform network attacks. 3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies 3.5 Explain common attacks and vulnerabilities against specialized systems. 3.6. Given a scenario, perform a social engineering or physical attack. 3.7 Given a scenario, perform post-exploitation techniques.
  • 20. 4.0 Reporting and communication PT0-002 New objectives 4.1 Compare and contrast important components of written reports. 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report. 4.3 Explain the importance of communication during the penetration testing process. 4.4 Explain post-report delivery activities.
  • 21. 5.0 Tools and code analysis PT0-002 New objectives 5.1 Explain the basic concepts of scripting and software development. 5.2 Given a scenario, analyze a script or code sample for use in a penetration test. 5.3 Explain use cases of the following tools during the phases of a penetration test.
  • 23. Get certified with Infosec Skills Train for your CompTIA certification with Infosec Skills: Infosec Skills subscription: ➢ 130+ role-based learning paths (e.g., ITF+, A+, Network+, Security+, CySA+ PenTest+, CASP+) ➢ 100s of hands-on labs in cloud-hosted cyber ranges ➢ Custom certification practice exams and skill assessments Infosec Skills live boot camp: ➢ Live, instructor-led training (in-person or live online) ➢ Certification exam voucher ➢ 90 day extended access to recordings of daily lessons, plus all materials in Infosec Skills ➢ Exam Pass Guarantee infosecinstitute.com/skills
  • 24. Get certified with Infosec Skills And the winner for a one-year subscription to Infosec Skills is … infosecinstitute.com/skills (Valued at $299)
  • 26. About us Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with  skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. www.infosecinstitute.com