Skip to product information
1 of 2

CompTIA

CompTIA PenTest+ (PT0-003) Complete Course, Labs, & Practice Exams

CompTIA PenTest+ (PT0-003) Complete Course, Labs, & Practice Exams

Regular price $399.00 USD
Regular price $0.00 USD Sale price $399.00 USD
Liquid error (snippets/price line 128): divided by 0% OFF Sold out
Type

Elevate Your Offensive Security Skills

Did you know the Bureau of Labor Statistics is projecting 32% growth for information security analyst roles through 2032?  This includes Penetration Testers.  The CompTIA PenTest+ (PT0-003) certification is a pivotal credential for professionals aiming to specialize in penetration testing and vulnerability management. Professionals holding the PenTest+ certification earn an average salary of $110,540, reflecting the high demand and value of this expertise in the cybersecurity field.

Who This Course Is For

  • Aspiring/current security analysts, pentesters, and vulnerability testers
  • Network security operations personnel
  • Individuals preparing for the CompTIA PenTest+ certification exam

What’s Included

  • 32+ hours of expert-led content
  • Comprehensive video training led by industry experts
  • Official CompTIA PenTest+ (PT0-003) study guide
  • Hands-on labs to simulate real-world penetration testing scenarios
  • Practice exams - Over 700 questions designed to mimic the real test
  • Downloadable study resources and tools
  • 12-month access to all course materials

What You’ll Learn

This course thoroughly prepares you for the CompTIA PenTest+ (PT0-003) exam by covering all five key domains:

  • Planning and Scoping 
  • Information Gathering and Vulnerability Identification
  • Attacks and Exploits 
  • Reporting and Communication 
  • Tools and Code Analysis 

Why Choose Dion Training?

  • Learn from seasoned cybersecurity professionals
  • 60-Day Pass Guarantee – Pass your exam or we pay for your retake
  • Hands-on labs to reinforce practical skills
  • CompTIA Platinum Partner
View full details
Modules
1 - Introduction
Toggle chapter
#
Lesson
Duration
Type
1.
Introduction
12m:23s
Video Video
2.
Download your free study guide
PDF PDF
3.
Exam Tips
4m:14s
Video Video
4.
How to Use the Lab Environment
5m:27s
Video Video
5.
Labs: Exploring the PenTest+ Lab Environment
Lab Lab
6.
100% Pass Guarantee
3m:49s
Video Video
7.
Checkpoint: Introduction
Quiz Quiz
2 - PenTesting Overview
Toggle chapter
#
Lesson
Duration
Type
1.
PenTesting Overview
2m:54s
Video Video
2.
Planning the Engagement
4m:23s
Video Video
3.
Information Gathering
4m:2s
Video Video
4.
Attacks and Exploits
3m:29s
Video Video
5.
Post-Exploitation
3m:4s
Video Video
6.
Reporting
3m:47s
Video Video
7.
Overview of a PenTest
9m:18s
Video Video
8.
Checkpoint: PenTesting Overview
Quiz Quiz
3 - Pre-Engagement Activities
Toggle chapter
#
Lesson
Duration
Type
1.
Pre-Engagement Activities
3m:20s
Video Video
2.
Regulations and Standards
6m:24s
Video Video
3.
Types of Assessments
4m:32s
Video Video
4.
Types of Agreements
4m:17s
Video Video
5.
Legal and Ethical Considerations
4m:31s
Video Video
6.
Rules of Engagement
4m:48s
Video Video
7.
Target Selection
4m:54s
Video Video
8.
Shared Responsibility Model
4m:23s
Video Video
9.
Preparing to PenTest a Cloud Provider
4m:13s
Video Video
10.
Checkpoint: Pre-Engagement Activities
Quiz Quiz
4 - Frameworks
Toggle chapter
#
Lesson
Duration
Type
1.
Frameworks
3m:43s
Video Video
2.
MITRE ATT&CK
4m:54s
Video Video
3.
OWASP
4m:55s
Video Video
4.
MASVS
4m:14s
Video Video
5.
PTES
5m:22s
Video Video
6.
CREST
3m:54s
Video Video
7.
OSSTMM
3m:8s
Video Video
8.
STRIDE
5m:41s
Video Video
9.
Purdue Model
3m:55s
Video Video
10.
OCTAVE
6m:53s
Video Video
11.
DREAD
5m:9s
Video Video
12.
Using the MITRE ATT&CK Framework
4m:33s
Video Video
13.
Checkpoint: Frameworks
Quiz Quiz
5 - Information Gathering
Toggle chapter
#
Lesson
Duration
Type
1.
Information Gathering
3m:9s
Video Video
2.
Passive Reconnaissance
3m:30s
Video Video
3.
Network Sniffing
5m:10s
Video Video
4.
Active Reconnaissance
3m:47s
Video Video
5.
Port and Protocol Scanning
5m:51s
Video Video
6.
HTML Scraping and Cached Pages
2m:59s
Video Video
7.
Banner Grabbing
5m:2s
Video Video
8.
Conducting Banner Grabbing
3m:45s
Video Video
9.
Checkpoint: Information Gathering
Quiz Quiz
6 - Open-Source Intelligence (OSINT)
Toggle chapter
#
Lesson
Duration
Type
1.
Open-Source Intelligence (OSINT)
2m:48s
Video Video
2.
Social Media and Job Boards
4m:45s
Video Video
3.
Information Disclosures
4m:8s
Video Video
4.
Cryptographic Flaws
6m:31s
Video Video
5.
DNS Lookups
7m:40s
Video Video
6.
Certificate Transparency Logs
4m:50s
Video Video
7.
Search Engine Analysis
4m:27s
Video Video
8.
Conducting OSINT
10m:35s
Video Video
9.
Checkpoint: Open-Source Intelligence (OSINT)
Quiz Quiz
7 - Scanning and Enumeration
Toggle chapter
#
Lesson
Duration
Type
1.
Scanning and Enumeration
3m:56s
Video Video
2.
OS and Service Discovery
14m:58s
Video Video
3.
Enumerating Protocols
4m:52s
Video Video
4.
Enumerating DNS
3m:56s
Video Video
5.
Enumerating Directories
5m:1s
Video Video
6.
Enumerating Hosts
6m:44s
Video Video
7.
Enumerating Users
2m:45s
Video Video
8.
Enumerating Email
3m:17s
Video Video
9.
Enumerating Permissions
4m:57s
Video Video
10.
Enumerating Wireless Devices
4m:27s
Video Video
11.
Enumerating Secrets
4m:53s
Video Video
12.
Enumerating the Web
4m:38s
Video Video
13.
Attack Path Mapping
3m:22s
Video Video
14.
Checkpoint: Scanning and Enumeration
Quiz Quiz
8 - Recon and Enumeration Tools
Toggle chapter
#
Lesson
Duration
Type
1.
Reconnaissance and Enumeration Tools
3m:36s
Video Video
2.
Wayback Machine
2m:46s
Video Video
3.
theHarvester and Hunter.io
4m:54s
Video Video
4.
OSINT Tools
4m:5s
Video Video
5.
Whois and recon-ng
20m:32s
Video Video
6.
nslookup and dig
6m:58s
Video Video
7.
DNSdumpster and Amass
6m:30s
Video Video
8.
Shodan and Censys.io
5m:42s
Video Video
9.
tcpdump
5m:31s
Video Video
10.
Wireshark
5m:42s
Video Video
11.
Wireless Analysis Tools
5m:12s
Video Video
12.
Checkpoint: Recon and Enumeration Tools
Quiz Quiz
9 - Nmap and NSE
Toggle chapter
#
Lesson
Duration
Type
1.
Nmap and NSE
2m:34s
Video Video
2.
Nmap Discovery Scans
7m:54s
Video Video
3.
Nmap Port Scans
9m:13s
Video Video
4.
Nmap Fingerprinting
4m:13s
Video Video
5.
Using Nmap
11m:31s
Video Video
6.
Nmap Scripting Engine
7m:0s
Video Video
7.
Checkpoint: Nmap and NSE
Quiz Quiz
10 - Scripting Basics
Toggle chapter
#
Lesson
Duration
Type
1.
Scripting Basics
2m:11s
Video Video
2.
Shells and Programming Languages
9m:48s
Video Video
3.
Variables
7m:52s
Video Video
4.
Loops
5m:20s
Video Video
5.
Logic Control
4m:33s
Video Video
6.
Data Structures
12m:37s
Video Video
7.
Object Oriented Programming
6m:58s
Video Video
8.
Checkpoint: Scripting Basics
Quiz Quiz
11 - Modifying Scripts
Toggle chapter
#
Lesson
Duration
Type
1.
Modifying Scripts
2m:55s
Video Video
2.
Bash Fundamentals
21m:16s
Video Video
3.
Understanding a Bash Script
4m:31s
Video Video
4.
Modifying a Bash Script
8m:44s
Video Video
5.
PowerShell Fundamentals
15m:41s
Video Video
6.
Understanding a PowerShell Script
3m:20s
Video Video
7.
Modifying a PowerShell Script
7m:42s
Video Video
8.
Python Fundamentals
20m:27s
Video Video
9.
Understanding a Python Script
3m:35s
Video Video
10.
Modifying a Python Script
5m:33s
Video Video
11.
Checkpoint: Modifying Scripts
Quiz Quiz
12 - Analyzing Scans
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Scans
3m:11s
Video Video
2.
Positive and Negative Results
4m:12s
Video Video
3.
Validating Scan Results
3m:56s
Video Video
4.
Using CVEs and CVSS
6m:16s
Video Video
5.
Exploit Prediction Scoring System
3m:44s
Video Video
6.
Target Prioritization
3m:50s
Video Video
7.
Common Target Criteria
4m:3s
Video Video
8.
Scripting for Result Validation
3m:1s
Video Video
9.
Scan Validations
3m:38s
Video Video
10.
Capability Selection
4m:30s
Video Video
11.
Documenting the Attack
6m:12s
Video Video
12.
Other Attack Considerations
4m:25s
Video Video
13.
Checkpoint: Analyzing Scans
Quiz Quiz
13 - Discovering Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Discovering Vulnerabilities
2m:14s
Video Video
2.
Application Scanning
4m:55s
Video Video
3.
Software Analysis
5m:54s
Video Video
4.
Host-Based Scanning
4m:25s
Video Video
5.
Network Scanning
5m:3s
Video Video
6.
Mobile Scanning
3m:17s
Video Video
7.
Container Scanning
5m:11s
Video Video
8.
Scanning IaC
5m:34s
Video Video
9.
ICS Vulnerability Discovery
5m:21s
Video Video
10.
Wireless Scans
4m:56s
Video Video
11.
Static Code Analysis (SonarQube)
5m:49s
Video Video
12.
Checkpoint: Discovering Vulnerabilities
Quiz Quiz
14 - Vulnerability Discovery Tools
Toggle chapter
#
Lesson
Duration
Type
1.
Vulnerability Discovery Tools
2m:12s
Video Video
2.
Nikto
5m:16s
Video Video
3.
Greenbone/OpenVAS
13m:32s
Video Video
4.
Trivy
3m:44s
Video Video
5.
BloodHound
6m:6s
Video Video
6.
PowerSploit
1m:30s
Video Video
7.
Grype
3m:13s
Video Video
8.
Kube-Hunter
3m:10s
Video Video
9.
TruffleHog
3m:25s
Video Video
10.
Checkpoint: Vulnerability Discovery Tools
Quiz Quiz
15 - Social Engineering Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Social Engineering Attacks
3m:15s
Video Video
2.
Methods of Influence
11m:2s
Video Video
3.
Phishing Campaigns
4m:35s
Video Video
4.
Using the Social Engineering Toolkit (SET)
13m:38s
Video Video
5.
Gophish
6m:12s
Video Video
6.
Impersonation
4m:17s
Video Video
7.
Surveillance Techniques
2m:45s
Video Video
8.
Watering Hole
3m:2s
Video Video
9.
Evilginx
5m:35s
Video Video
10.
Tailgating and Piggybacking
3m:40s
Video Video
11.
Browser Exploitation Framework (BeEF)
3m:4s
Video Video
12.
Checkpoint: Social Engineering Attacks
Quiz Quiz
16 - Wireless Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Wireless Attacks
2m:38s
Video Video
2.
Wireless Security
16m:26s
Video Video
3.
Wireless Signal Exploitation
4m:1s
Video Video
4.
Aircrack-ng
4m:54s
Video Video
5.
Wireless Hacking
8m:34s
Video Video
6.
WPS PIN Attacks
11m:37s
Video Video
7.
Captive Portal Attacks
4m:28s
Video Video
8.
Evil Twin
2m:59s
Video Video
9.
Kismet
3m:51s
Video Video
10.
Wi-Fi Protocol Fuzzing
4m:21s
Video Video
11.
Checkpoint: Wireless Attacks
Quiz Quiz
17 - Network Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Network Attacks
3m:51s
Video Video
2.
Stress Testing
6m:22s
Video Video
3.
Bypassing Segmentation
5m:21s
Video Video
4.
MAC Spoofing
5m:12s
Video Video
5.
NAC Bypass
4m:42s
Video Video
6.
Session-Based Attacks
3m:51s
Video Video
7.
Service Exploitation
5m:25s
Video Video
8.
Packet Crafting
4m:24s
Video Video
9.
Netcat
7m:36s
Video Video
10.
Using Netcat
10m:59s
Video Video
11.
Default Network Credentials
5m:2s
Video Video
12.
LLMNR/NBT-NS Poisoning
4m:43s
Video Video
13.
ARP Poisoning
7m:5s
Video Video
14.
Intro to Metasploit
5m:29s
Video Video
15.
Checkpoint: Network Attacks
Quiz Quiz
18 - Authentication Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Authentication Attacks
3m:24s
Video Video
2.
Types of Password Attack
4m:3s
Video Video
3.
Password Cracking Tools
7m:54s
Video Video
4.
Credential Attacks
7m:10s
Video Video
5.
Credential Passing Attacks
5m:9s
Video Video
6.
Directory Service Attacks
4m:16s
Video Video
7.
CrackMapExec (CME)
2m:8s
Video Video
8.
SAML Attacks
5m:27s
Video Video
9.
OpenID Connect (OIDC) Attacks
5m:42s
Video Video
10.
Hash Attacks
4m:3s
Video Video
11.
Checkpoint: Authentication Attacks
Quiz Quiz
19 - Host Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Host Attacks
3m:16s
Video Video
2.
Privilege Escalation
6m:31s
Video Video
3.
Conducting Privilege Escalation
13m:6s
Video Video
4.
Credential Harvesting
3m:55s
Video Video
5.
Misconfigured Endpoints
3m:34s
Video Video
6.
Unquoted Service Paths
4m:25s
Video Video
7.
Disabling Security Software
6m:19s
Video Video
8.
Payload Obfuscation
4m:27s
Video Video
9.
User-Controlled Access Bypass
7m:2s
Video Video
10.
Shell and Kiosk Escapes
3m:58s
Video Video
11.
Library and Process Injection
6m:57s
Video Video
12.
Log Tampering
3m:3s
Video Video
13.
Living Off the Land
3m:28s
Video Video
14.
Checkpoint: Host Attacks
Quiz Quiz
20 - Web Application Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Web Application Vulnerabilities
2m:51s
Video Video
2.
Race Conditions
4m:53s
Video Video
3.
Buffer Overflows
12m:26s
Video Video
4.
Buffer Overflow Attacks
6m:13s
Video Video
5.
Authentication Flaws and Insecure References
5m:53s
Video Video
6.
Improper Error Handling
5m:13s
Video Video
7.
Improper Headers
6m:8s
Video Video
8.
Code Signing
1m:58s
Video Video
9.
Vulnerable Components
11m:41s
Video Video
10.
Software Composition
9m:46s
Video Video
11.
Checkpoint: Web Application Vulnerabilities
Quiz Quiz
21 - Web Application Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Web Application Attacks
3m:20s
Video Video
2.
Directory Traversals
9m:32s
Video Video
3.
Directory Traversal Tools
10m:32s
Video Video
4.
Cross-Site Scripting (XSS)
8m:56s
Video Video
5.
Request Forgeries
4m:5s
Video Video
6.
SQL Injections
7m:0s
Video Video
7.
Performing SQL Injection Attacks
8m:27s
Video Video
8.
Injection Attacks
5m:21s
Video Video
9.
File Inclusions
3m:52s
Video Video
10.
Arbitrary Code Execution
4m:20s
Video Video
11.
Web Application Session Hijacking
5m:39s
Video Video
12.
Abusing APIs
7m:17s
Video Video
13.
OWASP ZAP
5m:7s
Video Video
14.
Attacking Web Applications
15m:36s
Video Video
15.
Checkpoint: Web Application Attacks
Quiz Quiz
22 - Cloud Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud Attacks
2m:53s
Video Video
2.
Identity and Access Management (IAM) Misconfigurations
4m:13s
Video Video
3.
Resource Misconfigurations
4m:33s
Video Video
4.
Logging Information Exposures
4m:32s
Video Video
5.
Metadata Service Attacks
6m:27s
Video Video
6.
Image and Artifact Tampering
5m:59s
Video Video
7.
Supply Chain Attacks
4m:54s
Video Video
8.
Container Exploits and Attacks
3m:46s
Video Video
9.
Trust Relationship Abuse
6m:38s
Video Video
10.
Third-party Integration Exploits
5m:12s
Video Video
11.
Cloud Security Testing
6m:11s
Video Video
12.
Conducting Cloud Audits
13m:58s
Video Video
13.
Checkpoint: Cloud Attacks
Quiz Quiz
23 - Attacking Specialized Systems
Toggle chapter
#
Lesson
Duration
Type
1.
Attacking Specialized Systems
2m:46s
Video Video
2.
Mobile Device Attacks
12m:15s
Video Video
3.
Tools for Mobile Device Attacks
5m:8s
Video Video
4.
Bluetooth Attacks
3m:9s
Video Video
5.
NFC and RFID Attacks
4m:46s
Video Video
6.
AI Attacks
4m:35s
Video Video
7.
Operational Technology (OT)
9m:14s
Video Video
8.
OT Attacks
10m:50s
Video Video
9.
Testing OT Systems
3m:37s
Video Video
10.
Checkpoint: Attacking Specialized Systems
Quiz Quiz
24 - Automated Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Automated Attacks
2m:58s
Video Video
2.
Automating Attacks with Bash
3m:41s
Video Video
3.
Empire/PowerSploit
4m:47s
Video Video
4.
PowerView
4m:29s
Video Video
5.
PowerUpSQL
5m:47s
Video Video
6.
AD Search
5m:34s
Video Video
7.
Impacket
3m:8s
Video Video
8.
Scapy
6m:49s
Video Video
9.
Caldera
4m:8s
Video Video
10.
Infection Monkey
3m:9s
Video Video
11.
Atomic Red Team
4m:10s
Video Video
12.
Checkpoint: Automated Attacks
Quiz Quiz
25 - Persistence
Toggle chapter
#
Lesson
Duration
Type
1.
Persistence
2m:37s
Video Video
2.
Command and Control
3m:41s
Video Video
3.
Automating Persistence
5m:6s
Video Video
4.
Remote Shells
4m:8s
Video Video
5.
Using Remote Shells
4m:55s
Video Video
6.
Backdoor
5m:53s
Video Video
7.
Remote Access Trojans
5m:45s
Video Video
8.
Account Credentials
5m:32s
Video Video
9.
Browser-Based Persistence
5m:16s
Video Video
10.
Security Control Tampering
6m:53s
Video Video
11.
Checkpoint: Persistence
Quiz Quiz
26 - Lateral Movement
Toggle chapter
#
Lesson
Duration
Type
1.
Lateral Movement
3m:4s
Video Video
2.
Pivoting and Relaying
3m:5s
Video Video
3.
Using ProxyChains
7m:43s
Video Video
4.
Enumerating for Lateral Movement
3m:21s
Video Video
5.
Service Discovery
5m:41s
Video Video
6.
Protocol Discovery
3m:0s
Video Video
7.
Remote Access Discovery
4m:27s
Video Video
8.
Printer Discovery
4m:19s
Video Video
9.
Discovering Internal Websites
8m:26s
Video Video
10.
Living Off the Land Tools
4m:30s
Video Video
11.
sshuttle
4m:39s
Video Video
12.
Covenant
5m:7s
Video Video
13.
Checkpoint: Lateral Movement
Quiz Quiz
27 - Exfiltration
Toggle chapter
#
Lesson
Duration
Type
1.
Exfiltration
2m:33s
Video Video
2.
Covert Channels
4m:4s
Video Video
3.
Steganography
5m:46s
Video Video
4.
Covert Channel Using DNS
7m:39s
Video Video
5.
Covert Channel Using ICMP
3m:34s
Video Video
6.
Covert Channel Using HTTPS
4m:42s
Video Video
7.
Alternate Data Streams (ADS)
3m:50s
Video Video
8.
Exfiltrating Data
4m:15s
Video Video
9.
Checkpoint: Exfiltration
Quiz Quiz
28 - Cleanup and Restoration
Toggle chapter
#
Lesson
Duration
Type
1.
Cleanup and Restoration
2m:6s
Video Video
2.
Persistence Removal
3m:20s
Video Video
3.
Revert Configuration Changes
3m:23s
Video Video
4.
Created Credentials Removal
2m:32s
Video Video
5.
Removal of Testing Tools
2m:25s
Video Video
6.
Decommission Testing Infrastructure
3m:9s
Video Video
7.
Artifact Preservation
2m:38s
Video Video
8.
Secure Data Destruction
2m:34s
Video Video
9.
Checkpoint: Cleanup and Restoration
Quiz Quiz
29 - Remediation Recommendations
Toggle chapter
#
Lesson
Duration
Type
1.
Remediation Recommendations
2m:27s
Video Video
2.
System Hardening
10m:50s
Video Video
3.
User Input Sanitization
4m:42s
Video Video
4.
Network and Infrastructure Controls
3m:55s
Video Video
5.
Authentication Recommendations
4m:27s
Video Video
6.
Encryption Recommendations
4m:45s
Video Video
7.
Patch Management
3m:51s
Video Video
8.
Process Level Remediation
2m:57s
Video Video
9.
Administrative Controls
14m:20s
Video Video
10.
Physical Controls
6m:55s
Video Video
11.
Operational Controls and Policies
2m:55s
Video Video
12.
Implementing Recommendations
8m:50s
Video Video
13.
Checkpoint: Remediation Recommendations
Quiz Quiz
30 - Penetration Test Reporting
Toggle chapter
#
Lesson
Duration
Type
1.
Penetration Test Reporting
2m:30s
Video Video
2.
Executive Summary Process
2m:57s
Video Video
3.
Root Cause Analysis
4m:24s
Video Video
4.
Report Components
4m:25s
Video Video
5.
Risk Scoring and Prioritization
3m:39s
Video Video
6.
Definitions in the Report
3m:37s
Video Video
7.
Limits and Assumptions
4m:23s
Video Video
8.
Special Considerations
5m:37s
Video Video
9.
Report Analysis Workshop
7m:3s
Video Video
10.
Checkpoint: Penetration Test Reporting
Quiz Quiz
31 - Conclusion
Toggle chapter
#
Lesson
Duration
Type
1.
Conclusion
12m:47s
Video Video
2.
BONUS: What comes next?
3m:44s
Video Video
3.
Practice Exam
Quiz Exam

Reviews