SlideShare a Scribd company logo
1 of 27
PenTest+
Everything you need to
know about CompTIA’s
new certification
Looking for
CPEs?
Infosec webinars are a great way
to earn CPEs
• Request your completion certificate at:
infosecinstitute.com/cpe
• CPE eligibility varies by certifying body.
Learn more at:
infosecinstitute.com/cpe-requirements
Meet your
speakers
Hunter Reed
Moderator
Marketing Events Intern at Infosec
Patrick Lane
Guest speaker
Director of Products at CompTIA
Agenda
● CompTIA PenTest+ overview
● PenTest+ career pathway
● PenTest+ exam objectives
● Training for the Pentest+
● Q&A
CompTIA PenTest+ overview
CompTIA PenTest+ certification
Domain % of exam
1.0 Planning and Scoping 15%
2.0 Information Gathering and Vulnerability Identification 22%
3.0 Attacks and Exploits 30%
4.0 Penetration Testing Tools 17%
5.0 Reporting and Communication 16%
Total 100%
CompTIA PenTest+ is a certification for intermediate-skills level cybersecurity professionals who are tasked
with hands-on penetration testing to identify, exploit, report and manage vulnerabilities on a network.
PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills
necessary to determine the resiliency of the network against attacks. Successful candidates will have the
intermediate skills and best practices required to customize assessment frameworks to effectively collaborate on
and report findings, and communicate recommended strategies to improve the overall state of IT security.
Skills competence for key job roles:
● Penetration tester
● Vulnerability tester
● Security analyst (II)
● Vulnerability assessment analyst
● Network security operations
● Application security vulnerability
How is Pentest+ different?
1. CompTIA PenTest+ is the only exam taken at a Pearson VUE testing center with both
hands-on, performance-based questions and multiple-choice, to ensure each
candidate possesses the skills, knowledge and ability to perform tasks on systems
1. CompTIA PenTest+ exam not only covers hands-on penetration testing and vulnerability
assessment, but includes management skills used to plan, scope and manage
weaknesses, not just exploit them.
1. CompTIA PenTest+ is unique because our certification requires a candidate to
demonstrate the hands-on ability and knowledge to test devices in new environments
such as the cloud and mobile, in addition to traditional desktops and servers.
Job task analysis (JTA) participants
Key JTA participants
● Brotherhood Mutual
● Global Cyber Security
● SecureWorks
● North State Technology Solutions
● BlackFire Consulting
● TransUnion
● Las Vegas Sands Corporation
● Integra LifeSciences
● Enterprise Holdings
● Paylocity
● Johns Hopkins University Applied
Physics Laboratory
● ASICS Corporation
PenTest+ exam information
Item Description
Exam code PT0-001
Launch date July 31, 2018
Availability Worldwide
Pricing $349 USD (as of 10/1/2018)
Testing provider Pearson VUE testing centers
Question types Performance based and multiple choice
# of questions Maximum of 85 questions
Length of test 165 minutes
Passing score 750 (on a scale of 100-900)
Languages English only
Recommended
experience
Network+, Security+ or equivalent knowledge
CE program, ISO/ANSI
and DoD accreditation
Yes, part of CE program; CompTIA will pursue ISO/ANSI 17024 and DoD 8140/8570 approval
Metasploit example
SET (social engineering toolkit) example
Workforce indicators
The U.S. Bureau of Labor Statistics (BLS)
classifies the job role under Information
Security Analysts, which includes:
● Conduct penetration testing, which is
when analysts simulate attacks to
look for vulnerabilities in their
systems before they can be exploited
● Median pay: $92,600 per year
● Number of jobs available: 82,900
● Job outlook: 28% growth by 2026
(much faster than average)
Cyberseek.org classifies the job role
under Penetration & Vulnerability Tester,
which includes:
● Median pay: $98,000 per year
● Number of jobs available: 6,695
(For comparison purposes, Cyberseek.org
states Cybersecurity Analyst open jobs at
19,017 jobs. That identifies one
pentester/vulnerability assessor job for
every three security analyst jobs.)
PenTest+ career pathway
Cybersecurity career pathway with PenTest+
Red team vs. blue team
Red team
(penetration testing)
Blue team
(security analyst)
Red teams try to break into systems by
identifying weaknesses in people, processes
and technology
Blue teams discover, contain and remove
intruders through intrusion detection tools and
other methods
Red team vs. blue team
Red team exploits
are demonstrated
Blue team intrusion
detection tools discover
red team exploits
PenTest+ exam objectives
PenTest+ domain objectives
1.0 Planning and Scoping 15%
1.1 Explain the importance of planning for an engagement
1.2 Explain key legal concepts
1.3 Explain the importance of scoping an engagement properly
1.4 Explain the key aspects of compliance-based assessments
PenTest+ domain objectives
2.0 Information Gathering and Vulnerability Identification 22%
2.1 Given a scenario, conduct information gathering using appropriate techniques
2.2 Given a scenario, perform a vulnerability scan
2.3 Given a scenario, analyze vulnerability scan results
2.4 Explain the process of leveraging information to prepare for exploitation
2.5 Explain weaknesses related to specialized systems
PenTest+ domain objectives
3.0 Attacks and Exploits 30%
3.1 Compare and contrast social engineering attacks
3.2 Given a scenario, exploit network-based vulnerabilities
3.3 Given a scenario, exploit wireless and RF-based vulnerabilities
3.4 Given a scenario, exploit application-based vulnerabilities
3.5 Given a scenario, exploit local host vulnerabilities
3.6 Summarize physical security attacks related to facilities
3.7 Given a scenario, perform post-exploitation techniques
PenTest+ domain objectives
4.0 Penetration Testing Tools 17%
4.1 Given a scenario, use Nmap to conduct information gathering exercises
4.2 Compare and contrast various use cases of tools
4.3 Given a scenario, analyze tool output or data related to a penetration test
4.4 Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
PenTest+ domain objectives
5.0 Reporting and Communication 16%
5.1 Given a scenario, use report writing and handling best practices
5.2 Explain post-report delivery activities
5.3 Given a scenario, recommend mitigation strategies for discovered vulnerabilities
5.4 Explain the importance of communication during the penetration testing process
Training for the Pentest+
Get PenTest+ certified
Learn penetration testing and prepare to earn your
PenTest+ certification
Hands-on training
Build your skills through 100+ labs in our cloud-hosted
cyber ranges, or test your exam readiness with dozens of
certification practice exams
7-day free trial, then $34/month!
Your complete career advisor
Your subscription includes unlimited access to 300+
courses and 45+ skill- and certification-based learning
paths, including:
● CompTIA’s Security+ (18 courses)
● CompTIA’s CySA+ (17 courses)
● CompTIA’s CASP+ (16 courses)
Questions?
Start your free trial
today!
infosecinstitute.com/skills
The bad guys are getting
smarter. Are you?
About us
At Infosec, we believe knowledge is the most
powerful tool in the fight against cybercrime. We
provide the best certification and skills
development training for IT and security
professionals, as well as employee security
awareness training and phishing simulations.
www.infosecinstitute.com
708.689.0131

More Related Content

What's hot

Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security TestingSanjulika Rastogi
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 

What's hot (17)

Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security Testing
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 

Similar to PenTest+: Everything you need to know about CompTIA’s new certification

CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
Introduction to comp tia pentest+
Introduction to comp tia pentest+Introduction to comp tia pentest+
Introduction to comp tia pentest+ShivamSharma909
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
Balakrishnan R [ 4.5 yr]
Balakrishnan R [ 4.5 yr]Balakrishnan R [ 4.5 yr]
Balakrishnan R [ 4.5 yr]Balakrishnan R
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Jorge Orchilles
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01Certified Professional - IoT Foundation (CP-IoTF) course information v1.01
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01DevOps++ Alliance
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
 
Testing and DevOps Culture: Lessons Learned
Testing and DevOps Culture: Lessons LearnedTesting and DevOps Culture: Lessons Learned
Testing and DevOps Culture: Lessons LearnedLB Denker
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Nidhi Resume_Software Testing
Nidhi Resume_Software TestingNidhi Resume_Software Testing
Nidhi Resume_Software TestingNidhi Singh
 
Sindhuri 4 plus Testing Resume
Sindhuri 4 plus Testing ResumeSindhuri 4 plus Testing Resume
Sindhuri 4 plus Testing ResumeSindhuri Maram
 

Similar to PenTest+: Everything you need to know about CompTIA’s new certification (20)

CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Introduction to comp tia pentest+
Introduction to comp tia pentest+Introduction to comp tia pentest+
Introduction to comp tia pentest+
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Balakrishnan R [ 4.5 yr]
Balakrishnan R [ 4.5 yr]Balakrishnan R [ 4.5 yr]
Balakrishnan R [ 4.5 yr]
 
Hema_Testing
Hema_TestingHema_Testing
Hema_Testing
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01Certified Professional - IoT Foundation (CP-IoTF) course information v1.01
Certified Professional - IoT Foundation (CP-IoTF) course information v1.01
 
Sandeep A Resume
Sandeep A ResumeSandeep A Resume
Sandeep A Resume
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
Resume_Latest
Resume_LatestResume_Latest
Resume_Latest
 
Testing and DevOps Culture: Lessons Learned
Testing and DevOps Culture: Lessons LearnedTesting and DevOps Culture: Lessons Learned
Testing and DevOps Culture: Lessons Learned
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Resume_raviprakash singh
Resume_raviprakash singhResume_raviprakash singh
Resume_raviprakash singh
 
Jayant resume
Jayant resumeJayant resume
Jayant resume
 
MathumithaGnanasekaran_Resume(1)
MathumithaGnanasekaran_Resume(1)MathumithaGnanasekaran_Resume(1)
MathumithaGnanasekaran_Resume(1)
 
Nidhi Resume_Software Testing
Nidhi Resume_Software TestingNidhi Resume_Software Testing
Nidhi Resume_Software Testing
 
Sindhuri 4 plus Testing Resume
Sindhuri 4 plus Testing ResumeSindhuri 4 plus Testing Resume
Sindhuri 4 plus Testing Resume
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedInfosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedInfosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxInfosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxInfosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxInfosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security rightInfosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Infosec
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examInfosec
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentInfosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessment
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

PenTest+: Everything you need to know about CompTIA’s new certification

  • 1. PenTest+ Everything you need to know about CompTIA’s new certification
  • 2. Looking for CPEs? Infosec webinars are a great way to earn CPEs • Request your completion certificate at: infosecinstitute.com/cpe • CPE eligibility varies by certifying body. Learn more at: infosecinstitute.com/cpe-requirements
  • 3. Meet your speakers Hunter Reed Moderator Marketing Events Intern at Infosec Patrick Lane Guest speaker Director of Products at CompTIA
  • 4. Agenda ● CompTIA PenTest+ overview ● PenTest+ career pathway ● PenTest+ exam objectives ● Training for the Pentest+ ● Q&A
  • 6. CompTIA PenTest+ certification Domain % of exam 1.0 Planning and Scoping 15% 2.0 Information Gathering and Vulnerability Identification 22% 3.0 Attacks and Exploits 30% 4.0 Penetration Testing Tools 17% 5.0 Reporting and Communication 16% Total 100% CompTIA PenTest+ is a certification for intermediate-skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report and manage vulnerabilities on a network. PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills and best practices required to customize assessment frameworks to effectively collaborate on and report findings, and communicate recommended strategies to improve the overall state of IT security. Skills competence for key job roles: ● Penetration tester ● Vulnerability tester ● Security analyst (II) ● Vulnerability assessment analyst ● Network security operations ● Application security vulnerability
  • 7. How is Pentest+ different? 1. CompTIA PenTest+ is the only exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge and ability to perform tasks on systems 1. CompTIA PenTest+ exam not only covers hands-on penetration testing and vulnerability assessment, but includes management skills used to plan, scope and manage weaknesses, not just exploit them. 1. CompTIA PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
  • 8. Job task analysis (JTA) participants Key JTA participants ● Brotherhood Mutual ● Global Cyber Security ● SecureWorks ● North State Technology Solutions ● BlackFire Consulting ● TransUnion ● Las Vegas Sands Corporation ● Integra LifeSciences ● Enterprise Holdings ● Paylocity ● Johns Hopkins University Applied Physics Laboratory ● ASICS Corporation
  • 9. PenTest+ exam information Item Description Exam code PT0-001 Launch date July 31, 2018 Availability Worldwide Pricing $349 USD (as of 10/1/2018) Testing provider Pearson VUE testing centers Question types Performance based and multiple choice # of questions Maximum of 85 questions Length of test 165 minutes Passing score 750 (on a scale of 100-900) Languages English only Recommended experience Network+, Security+ or equivalent knowledge CE program, ISO/ANSI and DoD accreditation Yes, part of CE program; CompTIA will pursue ISO/ANSI 17024 and DoD 8140/8570 approval
  • 11. SET (social engineering toolkit) example
  • 12. Workforce indicators The U.S. Bureau of Labor Statistics (BLS) classifies the job role under Information Security Analysts, which includes: ● Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited ● Median pay: $92,600 per year ● Number of jobs available: 82,900 ● Job outlook: 28% growth by 2026 (much faster than average) Cyberseek.org classifies the job role under Penetration & Vulnerability Tester, which includes: ● Median pay: $98,000 per year ● Number of jobs available: 6,695 (For comparison purposes, Cyberseek.org states Cybersecurity Analyst open jobs at 19,017 jobs. That identifies one pentester/vulnerability assessor job for every three security analyst jobs.)
  • 15. Red team vs. blue team Red team (penetration testing) Blue team (security analyst) Red teams try to break into systems by identifying weaknesses in people, processes and technology Blue teams discover, contain and remove intruders through intrusion detection tools and other methods
  • 16. Red team vs. blue team Red team exploits are demonstrated Blue team intrusion detection tools discover red team exploits
  • 18. PenTest+ domain objectives 1.0 Planning and Scoping 15% 1.1 Explain the importance of planning for an engagement 1.2 Explain key legal concepts 1.3 Explain the importance of scoping an engagement properly 1.4 Explain the key aspects of compliance-based assessments
  • 19. PenTest+ domain objectives 2.0 Information Gathering and Vulnerability Identification 22% 2.1 Given a scenario, conduct information gathering using appropriate techniques 2.2 Given a scenario, perform a vulnerability scan 2.3 Given a scenario, analyze vulnerability scan results 2.4 Explain the process of leveraging information to prepare for exploitation 2.5 Explain weaknesses related to specialized systems
  • 20. PenTest+ domain objectives 3.0 Attacks and Exploits 30% 3.1 Compare and contrast social engineering attacks 3.2 Given a scenario, exploit network-based vulnerabilities 3.3 Given a scenario, exploit wireless and RF-based vulnerabilities 3.4 Given a scenario, exploit application-based vulnerabilities 3.5 Given a scenario, exploit local host vulnerabilities 3.6 Summarize physical security attacks related to facilities 3.7 Given a scenario, perform post-exploitation techniques
  • 21. PenTest+ domain objectives 4.0 Penetration Testing Tools 17% 4.1 Given a scenario, use Nmap to conduct information gathering exercises 4.2 Compare and contrast various use cases of tools 4.3 Given a scenario, analyze tool output or data related to a penetration test 4.4 Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
  • 22. PenTest+ domain objectives 5.0 Reporting and Communication 16% 5.1 Given a scenario, use report writing and handling best practices 5.2 Explain post-report delivery activities 5.3 Given a scenario, recommend mitigation strategies for discovered vulnerabilities 5.4 Explain the importance of communication during the penetration testing process
  • 23. Training for the Pentest+
  • 24. Get PenTest+ certified Learn penetration testing and prepare to earn your PenTest+ certification Hands-on training Build your skills through 100+ labs in our cloud-hosted cyber ranges, or test your exam readiness with dozens of certification practice exams 7-day free trial, then $34/month! Your complete career advisor Your subscription includes unlimited access to 300+ courses and 45+ skill- and certification-based learning paths, including: ● CompTIA’s Security+ (18 courses) ● CompTIA’s CySA+ (17 courses) ● CompTIA’s CASP+ (16 courses)
  • 26. Start your free trial today! infosecinstitute.com/skills The bad guys are getting smarter. Are you?
  • 27. About us At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We provide the best certification and skills development training for IT and security professionals, as well as employee security awareness training and phishing simulations. www.infosecinstitute.com 708.689.0131