IT & Software Cybersecurity

CompTIA PenTest+ Exam Prep

Practical penetration testing, reporting, and exam-focused strategy for PT0-002 success

CompTIA PenTest+ Exam Prep logo
Quick Course Facts
17
Self-paced, Online, Lessons
17
Videos and/or Narrated Presentations
5.6
Approximate Hours of Course Media
About the CompTIA PenTest+ Exam Prep Course

Prepare for the CompTIA PenTest+ Exam Prep course with a structured path through core penetration testing concepts, technical workflows, and exam-ready decision-making. Designed for learners building IT & Software security skills, this course helps you connect reconnaissance, assessment, exploitation, post-exploitation, and reporting into a practical process you can apply on the PT0-002 exam and beyond.

Build Practical Penetration Testing Skills For PT0-002 Success

  • Follow a clear progression from penetration testing foundations to reporting and final exam review
  • Learn practical penetration testing, reporting, and exam-focused strategy for PT0-002 success
  • Strengthen your ability to evaluate targets, interpret findings, and communicate remediation guidance
  • Prepare for CompTIA PenTest+ Exam Prep with scenario-based coverage of networks, web apps, wireless, cloud, and scripting

This course delivers focused IT & Software training for penetration testing workflows, documentation, and PT0-002 exam preparation.

Across 17 targeted lessons, you will study the full lifecycle of a penetration test, beginning with roles, phases, scoping, rules of engagement, legal boundaries, and safe lab setup. You will then move into passive and active reconnaissance, scanning, enumeration, vulnerability analysis, and target prioritization so you can understand how effective assessments are planned and executed in real-world security environments. This CompTIA PenTest+ Exam Prep course keeps the material grounded in practical application while reinforcing the objectives most relevant to the certification exam. The course also covers credential attacks, authentication weaknesses, network exploitation concepts, web application testing, and essential techniques for wireless, mobile, and IoT environments, giving you broader IT & Software security exposure. As you advance, you will explore Active Directory basics, lateral movement, privilege escalation, persistence, cloud and container testing, and scripting concepts that support efficient testing workflows. A dedicated reporting section shows you how to handle evidence, maintain notes, write findings, assign risk ratings, and present remediation guidance clearly, which is critical for both practical penetration testing, reporting, and exam-focused strategy for PT0-002 success. By the end of the course, you will be better prepared to approach PenTest+ scenarios with confidence, manage exam time more effectively, and think like a penetration tester who can assess systems, document results, and communicate security value professionally.

Course Lessons

Full lesson breakdown

Lessons are organized by topic area and each includes descriptive copy for search visibility and student clarity.

Foundations

3 lessons

This lesson establishes the operating model for CompTIA PenTest+ by clarifying who participates in a penetration test, how an engagement progresses from planning through reporting, and how those activ…

Lesson 2: Scoping, Rules of Engagement, and Legal Boundaries

20 min
This lesson establishes how a penetration test is authorized, bounded, and conducted safely before any technical testing begins. You will learn how scoping decisions, rules of engagement, and legal co…

Lesson 3: Lab Setup, Safety, and PenTest Tool Categories

17 min
This lesson establishes the operating baseline for the course: how to build a safe penetration testing lab, work within authorization boundaries, protect systems and data during testing, and think abo…

Reconnaissance

2 lessons

Lesson 4: Passive Reconnaissance and Open-Source Intelligence

19 min
This lesson explains how passive reconnaissance and open-source intelligence support a professional penetration test without directly interacting with the target environment. You will learn how to ide…

Lesson 5: Active Reconnaissance, Scanning, and Enumeration

21 min
This lesson focuses on the active discovery phase of a penetration test: interacting with the target to identify live hosts, open ports, exposed services, and useful system details that can guide late…

Assessment

2 lessons

Lesson 6: Vulnerability Analysis and Prioritizing Targets

18 min
This lesson focuses on the part of a penetration test that sits between raw scanning output and active exploitation: analyzing vulnerabilities, validating what matters, and choosing targets in a defen…

Lesson 7: Credential Attacks, Password Security, and Authentication Weaknesses

20 min
This assessment lesson checks whether learners can recognize common credential attack scenarios, evaluate password storage and authentication design flaws, and choose the most defensible remediation i…

Exploitation

3 lessons

Lesson 8: Network Exploitation Concepts and Common Attack Paths

22 min
This lesson explains how penetration testers think about network exploitation after discovery and enumeration are complete. It focuses on recognizing realistic attack paths, validating exposure safely…

Lesson 9: Web Application Testing: Input Validation, Sessions, and APIs

24 min
This lesson focuses on how to test web applications for exploitable weaknesses in input validation, session handling, and API design during an authorized penetration test. You will learn how to move f…

Lesson 10: Wireless, Mobile, and IoT Testing Essentials

18 min
This lesson focuses on how authorized testers evaluate exploitation opportunities in wireless, mobile, and IoT environments without drifting into unrelated reconnaissance or reporting depth that belon…

Post-Exploitation

2 lessons

Lesson 11: Active Directory and Lateral Movement Basics

21 min
This lesson introduces how Active Directory environments shape post-exploitation decisions and why lateral movement is usually about identity, trust, and access paths rather than isolated hosts. You w…

Lesson 12: Privilege Escalation, Persistence, and Cleanup Considerations

19 min
This lesson covers what happens after initial access in a controlled penetration test: validating privilege level, identifying safe escalation paths, deciding whether persistence is in scope, and clea…

Specialized Environments

2 lessons

Lesson 13: Cloud, Virtualization, and Container Security Testing

20 min
This lesson covers how penetration testing changes when the target lives in a cloud tenant, virtualized infrastructure, or containerized platform. You will learn how to scope and test these environmen…

Lesson 14: Scripting, Automation, and Interpreting Simple Code for PenTesting

18 min
This lesson shows how PenTest+ candidates use lightweight scripting and safe automation when testing specialized environments such as cloud workloads, containers, APIs, embedded Linux devices, and Win…

Reporting

2 lessons

Lesson 15: Evidence Handling, Notes, and Reporting Workflow

17 min
This lesson covers the reporting workflow that turns raw penetration testing activity into defensible evidence, usable notes, and a clear final report. You will learn how to capture proof without over…

Lesson 16: Writing Findings, Risk Ratings, and Remediation Guidance

20 min
This lesson focuses on the part of a penetration test report that clients act on most: the findings. You will learn how to turn technical evidence into clear, defensible write-ups that explain what wa…

Exam Prep

1 lesson

Lesson 17: Exam Scenario Strategy, Time Management, and Final Review

22 min
This lesson focuses on how to perform well on the CompTIA PenTest+ exam once your technical preparation is already in place. You will learn a practical approach for handling performance-based and mult…
About Your Instructor
Professor Chloe Vincent

Professor Chloe Vincent

Professor Chloe Vincent guides this AI-built Virversity course with a clear, practical teaching style.