What’s included
What You’ll Learn
CompTIA CertMaster Labs for PenTest+ (PT0-002) enable hands-on practice and skills development using real equipment and software accessed through a remote, browser-based lab environment. Aligned with Official CompTIA courseware and the CompTIA PenTest+ (PT0-002) exam objectives, CertMaster Labs make it easy for learners to practice and apply their skills in real workplace scenarios in preparation for the certification exam. All lab activities include gradable assessments, offer feedback and hints, and provide a score based on learner inputs, ultimately guiding learners to the most correct and efficient path through job tasks and, in a classroom environment, providing instructors with meaningful insight into student performance.
There are two types of labs in the course:
Labs Available:
Assisted Lab: Exploring the Lab Environment
Assisted Lab: Gathering Intelligence
Assisted Lab: Performing Social Engineering using SET
Assisted Lab: Discovering Information using Nmap
Assisted Lab: Performing Vulnerability Scans and Analysis
Assisted Lab: Penetrating an Internal Network
Assisted Lab: Exploiting Web Authentication
Assisted Lab: Exploiting Weaknesses in a Website
Assisted Lab: Exploiting Weaknesses in a Database
Assisted Lab: Using SQL Injection
Assisted Lab: Performing an AitM Attack
Assisted Lab: Performing Password Attacks
Assisted Lab: Using Reverse and Bind Shells
Assisted Lab: Performing Post-Exploitation Activities
Assisted Lab: Establishing Persistence
Assisted Lab: Performing Lateral Movement
License Information
CertMaster Labs for PenTest+ provides you with the necessary platform to gain critical hands-on experience:
CertMaster Labs addresses the practical aspects of the CompTIA PenTest+ exam objectives and complements prior training through access to real equipment and software environments.
Browser-based access to software applications and operating systems used on the job.
Explain the importance of planning and key aspects of compliance-based assessments
Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities
Conduct information gathering exercises with various tools and analyze output and basic scripts (limited to: Bash, Python, Ruby, PowerShell)
Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.
Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks, and perform post-exploitation techniques