Skip to product information
1 of 2

CompTIA

CompTIA PenTest+ (PT0-002) Complete Course, Labs, & Practice Exams

CompTIA PenTest+ (PT0-002) Complete Course, Labs, & Practice Exams

Regular price $399.00 USD
Regular price $0.00 USD Sale price $399.00 USD
Liquid error (snippets/price line 128): divided by 0% OFF Sold out
Type

Elevate Your Cybersecurity Skills

Did you know the Bureau of Labor Statistics projects 32% job growth for information security analysts through 2032?  This includes penetration testers. CompTIA PenTest+ (PT0-002) trains IT professionals to specialize in penetration testing and vulnerability management. Professionals holding the PenTest+ certification earn an average salary of $110,540.

Who This Course Is For

  • Aspiring/current security analysts, pentesters, and vulnerability testers
  • Network security operations personnel
  • Individuals preparing for the CompTIA PenTest+ certification exam

What’s Included

  • 32+ hours of expert led content
  • Comprehensive video training led by industry experts
  • Official CompTIA PenTest+ (PT0-002) study guide
  • Hands-on labs to simulate real-world penetration testing scenarios
  • Over 700 practice exam questions to assess your readiness
  • Downloadable study resources and tools
  • 12-month access to all course materials

What You’ll Learn

This course thoroughly prepares you for the CompTIA PenTest+ (PT0-002) exam by covering all five key domains:

  • Planning and Scoping 
  • Information Gathering and Vulnerability Identification
  • Attacks and Exploits 
  • Reporting and Communication 
  • Tools and Code Analysis 

Why Choose Dion Training?

  • Learn from seasoned cybersecurity professionals
  • 60-Day Pass Guarantee – Pass your exam or we pay for your retake
  • Hands-on labs to reinforce practical skills
  • Recognized as a CompTIA Platinum Partner

Course Outline:

View full details
Modules
1 - Welcome to the PenTest+ (PT0-002) Course
Toggle chapter
#
Lesson
Duration
Type
1.
Welcome
FREE
12h:32m
Video FREE
2.
Download your free study guide
PDF PDF
3.
Exam Tips
FREE
3h:50m
Video FREE
4.
How to Use the Lab Environment
FREE
5h:47m
Video FREE
5.
Labs: Exploring the PenTest+ Lab Environment
Lab Lab
6.
100% Pass Guarantee
FREE
3h:45m
Video FREE
7.
Checkpoint: Welcome
Quiz Quiz
2 - Planning an Engagement
Toggle chapter
#
Lesson
Duration
Type
1.
Planning an Engagement
2h:29m
Video Video
2.
Risk
FREE
9h:14m
Video FREE
3.
Risk Handling
7h:55m
Video Video
4.
Controls
7h:33m
Video Video
5.
PenTest Methodologies
7h:58m
Video Video
6.
PenTest Standards
7h:9m
Video Video
7.
Planning a Test
FREE
9h:42m
Video FREE
8.
Legal Concepts
8h:23m
Video Video
9.
Regulatory Compliance
15h:19m
Video Video
10.
Professionalism
10h:34m
Video Video
11.
Checkpoint: Planning an Engagement
Quiz Quiz
3 - Scoping an Engagement
Toggle chapter
#
Lesson
Duration
Type
1.
Scoping an Engagement
3h:38m
Video Video
2.
Defining the Scope
6h:59m
Video Video
3.
Adversary Emulation
11h:56m
Video Video
4.
Target List
10h:59m
Video Video
5.
Identifying Restrictions
8h:4m
Video Video
6.
Rules of Engagement
7h:48m
Video Video
7.
Assessment Types
9h:4m
Video Video
8.
Validating the Scope
5h:20m
Video Video
9.
Limitations and Permission
7h:4m
Video Video
10.
Build a Virtual Lab
16h:41m
Video Video
11.
Checkpoint: Scoping an Engagement
Quiz Quiz
4 - Passive Reconnaissance
Toggle chapter
#
Lesson
Duration
Type
1.
Passive Reconnaissance
3h:48m
Video Video
2.
Information Gathering
6h:0m
Video Video
3.
Open-Source Intelligence (OSINT)
6h:51m
Video Video
4.
Social Media Scraping
10h:50m
Video Video
5.
OSINT Tools
11h:47m
Video Video
6.
Using OSINT Tools
26h:37m
Video Video
7A.
Lab: Discovering IoT devices with Shodan
Video Video
8.
DNS Information
10h:29m
Video Video
9A.
Lab: Exploring the Domain Tools: Nslookup, Dig, and Whois
Lab Lab
10.
Reconnaissance with CentralOps
13h:7m
Video Video
11.
Public Repositories
8h:12m
Video Video
12.
Search Engine Analysis
6h:23m
Video Video
13.
URL Analysis
15h:23m
Video Video
14A.
Lab: Navigating Open-Source Intelligence Tools
Video Video
15.
Cryptographic Flaws
16h:33m
Video Video
16.
CWE & CVE
6h:52m
Video Video
17.
Checkpoint: Passive Reconnaissance
Quiz Quiz
5 - Active Reconnaissance
Toggle chapter
#
Lesson
Duration
Type
1.
Active Reconnaissance
3h:15m
Video Video
2.
Scanning and Enumeration
10h:10m
Video Video
3.
Conducting Enumeration
15h:0m
Video Video
4.
Other Enumeration
9h:27m
Video Video
5A.
Lab: Demonstrating Enumeration Techniques
Video Video
6.
Website Reconnaissance
11h:42m
Video Video
7.
Detecting and Evading Defenses
10h:13m
Video Video
8.
Packet Crafting
10h:35m
Video Video
9.
Eavesdropping
10h:19m
Video Video
10.
Wardriving
8h:19m
Video Video
11.
DNS and ARP Analysis
23h:6m
Video Video
12.
Network Traffic Analysis
17h:56m
Video Video
13.
Checkpoint: Active Reconnaissance
Quiz Quiz
6 - Vulnerability Scanning
Toggle chapter
#
Lesson
Duration
Type
1.
Vulnerability Scanning
2h:24m
Video Video
2.
Vulnerability Lifecycle
8h:39m
Video Video
3.
Vulnerability Scans
11h:13m
Video Video
4.
Scanning Considerations
9h:26m
Video Video
5.
Nessus Scanning
9h:12m
Video Video
6.
OpenVas Scanning
13h:37m
Video Video
7A.
Lab: Exploring OpenVAS
Lab Lab
8.
Nikto Scanning
5h:22m
Video Video
9A.
Lab: Using Web Scanners
Lab Lab
10.
Checkpoint: Vulnerability Scanning
Quiz Quiz
7 - Nmap
Toggle chapter
#
Lesson
Duration
Type
1.
Nmap
4h:17m
Video Video
2.
Nmap Discovery Scans
7h:57m
Video Video
3.
Nmap Port Scans
9h:16m
Video Video
4.
Nmap Fingerprinting
4h:16m
Video Video
5.
Using Nmap
11h:35m
Video Video
6A.
Lab: Understanding Nmap Common Usage
Lab Lab
7.
Nmap Scripting Engine
20h:24m
Video Video
8A.
Lab: Scanning a Vulnerable System
Lab Lab
8B.
Lab: Understanding Scan Output
Lab Lab
9.
Checkpoint: Nmap
Quiz Quiz
8 - Social Engineering and Physical Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Social Engineering and Physical Attacks
4h:10m
Video Video
2.
Methods of Influence
11h:15m
Video Video
3.
Social Engineering
14h:3m
Video Video
4.
Phishing Campaigns
5h:16m
Video Video
5.
Social Engineering Toolkit
13h:40m
Video Video
6A.
Lab: Understanding Social Engineering Toolkit (SET)
Lab Lab
7.
Pretexting
4h:11m
Video Video
8.
Baiting Victims
7h:18m
Video Video
9.
Impersonation
4h:20m
Video Video
10A.
Lab: Understanding Spearphishing and Credentials Attack
Lab Lab
11.
Physical Security
15h:44m
Video Video
12.
Lock Picking
1h:40m
Video Video
13.
Physical Attacks
10h:28m
Video Video
14.
Social Engineering Tools
4h:15m
Video Video
15.
Checkpoint: Social Engineering and Physical Attacks
Quiz Quiz
9 - Wireless Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Wireless Attacks
4h:6m
Video Video
2.
Wireless Security
16h:42m
Video Video
3.
Bypassing MAC Filtering
4h:10m
Video Video
4.
Signal Exploitation
11h:20m
Video Video
5.
WEP Hacking
9h:24m
Video Video
6.
WPA/WPA2 Hacking
8h:40m
Video Video
7.
WPS PIN Attacks
11h:50m
Video Video
8A.
Lab: Monitoring with Aircrack-ng
Lab Lab
9.
Evil Twins
5h:56m
Video Video
10.
On-path and Relay Attacks
5h:51m
Video Video
11.
Bluetooth Attacks
5h:52m
Video Video
12.
RFID and NFC Attacks
4h:48m
Video Video
13.
Checkpoint: Wireless Attacks
Quiz Quiz
10 - Network Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Network Attacks
3h:11m
Video Video
2.
Stress Testing
6h:36m
Video Video
3.
Exploit Resources
6h:26m
Video Video
4.
ARP Poisoning
7h:20m
Video Video
5.
DNS Cache Poisoning
13h:1m
Video Video
6.
LLMNR/NBT-NS Poisoning
4h:59m
Video Video
7.
MAC Spoofing
5h:28m
Video Video
8.
VLAN Hopping
6h:59m
Video Video
9.
NAC Bypass
4h:55m
Video Video
10.
On-path Attack
4h:2m
Video Video
11.
Password Attacks
10h:11m
Video Video
12A.
Lab: Exploring Password Attacks with John the Ripper and Hydra
Lab Lab
13.
Pass the Hash
7h:59m
Video Video
14A.
Lab: Exploring the Basics of Metasploit
Lab Lab
15.
Intro to Metasploit
18h:56m
Video Video
16.
Netcat
8h:10m
Video Video
17.
Using Netcat
11h:2m
Video Video
18.
Checkpoint: Network Attacks
Quiz Quiz
11 - Application Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Application Vulnerabilities
7h:26m
Video Video
2.
Race Conditions
4h:58m
Video Video
3.
Buffer Overflows
12h:26m
Video Video
4.
Buffer Overflow Attacks
6h:27m
Video Video
5.
Authentication and References
5h:53m
Video Video
6.
Improper Error Handling
5h:11m
Video Video
7.
Improper Headers
6h:10m
Video Video
8.
Code Signing
1h:56m
Video Video
9.
Vulnerable Components
11h:45m
Video Video
10.
Software Composition
9h:47m
Video Video
11.
Privilege Escalation
6h:9m
Video Video
12.
Conducting Privilege Escalation
13h:9m
Video Video
13.
Checkpoint: Application Vulnerabilities
Quiz Quiz
12 - Application Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Application Attacks
3h:39m
Video Video
2.
Directory Traversals
9h:32m
Video Video
3.
Dirbuster
7h:18m
Video Video
4.
Cross-Site Scripting (XSS)
9h:0m
Video Video
5.
Cross-Site Request Forgery (CSRF)
7h:16m
Video Video
6.
SQL Injections
7h:2m
Video Video
7.
Conducting SQL Injections
8h:27m
Video Video
8.
Burp Suite and SQLmap
10h:9m
Video Video
9A.
Lab: Using SQL Injection
Lab Lab
10.
OWASP ZAP
2h:49m
Video Video
11.
XML Injections
6h:20m
Video Video
12.
Other Injection Attacks
4h:18m
Video Video
13.
Attacking Web Applications
15h:37m
Video Video
14.
Checkpoint: Application Attacks
Quiz Quiz
13 - Cloud Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud Attacks
2h:41m
Video Video
2.
Attacking the Cloud
6h:56m
Video Video
3.
Credential Harvesting
8h:19m
Video Video
4.
Misconfigured Assets
12h:15m
Video Video
5.
Metadata Service Attack
6h:45m
Video Video
6.
Software Development Kit (SDK)
2h:57m
Video Video
7.
Auditing the Cloud
5h:7m
Video Video
8.
Conducting Cloud Audits
14h:1m
Video Video
9A.
Lab: Using VSFTP Manual and Metasploit
Lab Lab
10.
Checkpoint: Cloud Attacks
Quiz Quiz
14 - Attacks on Mobile Devices
Toggle chapter
#
Lesson
Duration
Type
1.
Attacks on Mobile Devices
5h:42m
Video Video
2.
Enterprise Mobility Management
9h:36m
Video Video
3.
Deployment Options
4h:36m
Video Video
4.
Mobile Reconnaissance Concerns
7h:57m
Video Video
5.
Mobile Device Insecurity
12h:15m
Video Video
6.
Multifactor Authentication
12h:12m
Video Video
7.
Mobile Device Attacks
5h:16m
Video Video
8.
Malware Analysis
13h:13m
Video Video
9.
Conducting Malware Analysis
25h:55m
Video Video
10.
Mobile Device Tools
8h:28m
Video Video
11.
Checkpoint: Attacks on Mobile Devices
Quiz Quiz
15 - Attacks on Specialized Systems
Toggle chapter
#
Lesson
Duration
Type
1.
Attacks on Specialized Systems
3h:32m
Video Video
2.
Internet of Things (IoT) Devices
8h:35m
Video Video
3.
Internet of Things (IoT) Vulnerabilities
7h:38m
Video Video
4.
Embedded Systems
6h:50m
Video Video
5.
ICS and SCADA Devices
9h:16m
Video Video
6.
ICS Protocols and Vulnerabilities
10h:54m
Video Video
7.
Data Storage Vulnerabilities
6h:4m
Video Video
8.
Virtual Environments
8h:19m
Video Video
9.
Virtual Machine Attacks
5h:59m
Video Video
10.
Containerization
5h:45m
Video Video
11.
Checkpoint: Attacks on Specialized Systems
Quiz Quiz
16 - Post-exploitation Exploits
Toggle chapter
#
Lesson
Duration
Type
1.
Post-exploitation
3h:13m
Video Video
2.
Enumerating the Network
4h:8m
Video Video
3.
Network Segmentation Testing
3h:15m
Video Video
4.
Lateral Movement and Pivoting
3h:3m
Video Video
5.
Pass the Hash
7h:52m
Video Video
6.
Golden Ticket
6h:8m
Video Video
7.
Lateral Movement
8h:34m
Video Video
8.
Pivoting
7h:43m
Video Video
9.
Escalating Privileges
19h:21m
Video Video
10.
Upgrading Restrictive Shells
5h:27m
Video Video
11.
Checkpoint: Post-exploitation
Quiz Quiz
17 - Detection Avoidance
Toggle chapter
#
Lesson
Duration
Type
1.
Detection Avoidance
1h:37m
Video Video
2.
Trojans and Backdoors
4h:44m
Video Video
3.
Creating Persistence
13h:53m
Video Video
4A.
Lab: Using Reverse and Bind Shells
Lab Lab
5.
Living Off the Land
12h:5m
Video Video
6.
Data Exfiltration
6h:46m
Video Video
7.
Covert Channels
4h:47m
Video Video
8.
Steganography
6h:2m
Video Video
9A.
Lab: Navigating Steganography Tools
Lab Lab
10.
Covering Your Tracks
10h:9m
Video Video
11.
Persistence and Covering Your Tracks
8h:44m
Video Video
12.
Post-Exploitation Tools
3h:2m
Video Video
13.
Checkpoint: Post-exploitation
Quiz Quiz
18 - Communication and Reports
Toggle chapter
#
Lesson
Duration
Type
1.
Communication and Reports
1h:59m
Video Video
2.
Communication Paths
5h:27m
Video Video
3.
Communication Triggers
4h:39m
Video Video
4.
Reasons for Communication
10h:21m
Video Video
5.
Presentation of Findings
6h:6m
Video Video
6.
Report Data Gathering
3h:40m
Video Video
7.
Written Reports
14h:45m
Video Video
8.
Common Themes
3h:6m
Video Video
9.
Securing and Storing Reports
5h:9m
Video Video
10.
Checkpoint: Communication and Reports
Quiz Quiz
19 - Findings and Remediations
Toggle chapter
#
Lesson
Duration
Type
1.
Findings and Remediations
3h:51m
Video Video
2.
Security Control Categories
13h:35m
Video Video
3.
Selecting Security Controls
4h:45m
Video Video
4.
Physical Controls
6h:57m
Video Video
5.
Operational Controls
10h:25m
Video Video
6.
Admnistrative Controls
14h:28m
Video Video
7.
System Hardening
11h:2m
Video Video
8.
Secure Coding
9h:28m
Video Video
9.
Implementing MFA
6h:25m
Video Video
10.
Digital Certificates
9h:50m
Video Video
11.
Other Technical Controls
2h:46m
Video Video
12.
Mitigation Strategies
8h:10m
Video Video
13.
Checkpoint: Findings and Remediations
Quiz Quiz
20 - Post-report Activities
Toggle chapter
#
Lesson
Duration
Type
1.
Post-report Activities
3h:30m
Video Video
2.
Remove Shells and Tools
2h:58m
Video Video
3.
Delete Test Credentials
1h:59m
Video Video
4.
Destroy Test Data
2h:53m
Video Video
5.
Client Acceptance
3h:4m
Video Video
6.
Attestation of Findings
3h:5m
Video Video
7.
Lessons Learned
4h:7m
Video Video
8.
Retesting
2h:45m
Video Video
9.
Checkpoint: Post-report Activities
Quiz Quiz
21 - Scripting Basics
Toggle chapter
#
Lesson
Duration
Type
1.
Scripting Basics
3h:5m
Video Video
2.
Shells and Programming Languages
9h:53m
Video Video
3.
Variables
7h:53m
Video Video
4.
Loops
5h:21m
Video Video
5.
Logic Control
4h:40m
Video Video
6.
Data Structures
12h:44m
Video Video
7.
Object Oriented Programming
7h:1m
Video Video
8.
Checkpoint: Scripting Basics
Quiz Quiz
22 - Analyzing Scripts
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Scripts
7h:23m
Video Video
2.
Coding in Bash
21h:19m
Video Video
3.
Bash Example
4h:35m
Video Video
4.
Coding in PowerShell
15h:45m
Video Video
5.
PowerShell Example
3h:25m
Video Video
6.
Coding in Python
20h:39m
Video Video
7.
Python Example
3h:40m
Video Video
8.
Coding in Perl
17h:27m
Video Video
9.
Perl Example
16h:13m
Video Video
10.
Coding in JavaScript
19h:23m
Video Video
11.
JavaScript Example
9h:48m
Video Video
12.
Coding in Ruby
13h:45m
Video Video
13.
Ruby Example
4h:15m
Video Video
14A.
Lab: Exploring Programming Shells
Lab Lab
15.
Checkpoint: Analyzing Scripts
Quiz Quiz
23 - Exploits and Automation
Toggle chapter
#
Lesson
Duration
Type
1.
Exploits and Automation
2h:4m
Video Video
2.
Exploits to Download Files
4h:35m
Video Video
3.
Exploits for Remote Access
9h:33m
Video Video
4.
Exploits for Enumerating Users
6h:2m
Video Video
5.
Exploits for Enumerating Assets
5h:37m
Video Video
6A.
Lab: Analyzing Exploit Code
Lab Lab
7.
Automation in Engagements
3h:30m
Video Video
8.
Automation with Nmap Scripts
2h:38m
Video Video
9A.
Lab: Applying PenTest Automation
Lab Lab
10.
Checkpoint: Exploits and Automation
Quiz Quiz
24 - Tool Round-up
Toggle chapter
#
Lesson
Duration
Type
1.
Tool Round-up
3h:42m
Video Video
2.
OSINT Tools
6h:16m
Video Video
3.
Scanning Tools
6h:42m
Video Video
4.
Networking Tools
2h:34m
Video Video
5.
Wireless Tools
7h:40m
Video Video
6.
Social Engineering Tools
2h:37m
Video Video
7.
Remote Access Tools
4h:25m
Video Video
8.
Credential Testing Tools
7h:44m
Video Video
9.
Web Application Tools
2h:28m
Video Video
10.
Cloud Tools
3h:1m
Video Video
11.
Steganography Tools
8h:11m
Video Video
12.
Debuggers
5h:36m
Video Video
13.
Miscellaneous Tools
9h:31m
Video Video
14A.
Lab: Understanding Spear Phishing and Credentials Attack
Lab Lab
15.
Checkpoint: Tool Round-up
Quiz Quiz
25 - Conclusion
Toggle chapter
#
Lesson
Duration
Type
1.
Conclusion Lesson
15h:45m
Video Video
2.
BONUS: Where to go from here?
Video Video
3.
Practice Exam (PT0-002)
Quiz Exam