CompTIA PenTest+
computer Online: 19. Jan 2026 bis 23. Jan 2026 |
placeAugsburg 19. Jan 2026 bis 23. Jan 2026 |
placeGraz 19. Jan 2026 bis 23. Jan 2026 |
placeInnsbruck 19. Jan 2026 bis 23. Jan 2026 |
placeMünchen 19. Jan 2026 bis 23. Jan 2026 |
placeNürnberg 19. Jan 2026 bis 23. Jan 2026 |
placePassau 19. Jan 2026 bis 23. Jan 2026 |
placeRegensburg 19. Jan 2026 bis 23. Jan 2026 |
placeSalzburg 19. Jan 2026 bis 23. Jan 2026 |
placeWien 19. Jan 2026 bis 23. Jan 2026 |
placeWürzburg 19. Jan 2026 bis 23. Jan 2026 |
computer Online: 26. Jan 2026 bis 30. Jan 2026 |
placeBarcelona 26. Jan 2026 bis 30. Jan 2026 |
placeBilbao 26. Jan 2026 bis 30. Jan 2026 |
placeDortmund 26. Jan 2026 bis 30. Jan 2026 |
placeDüsseldorf 26. Jan 2026 bis 30. Jan 2026 |
placeEssen 26. Jan 2026 bis 30. Jan 2026 |
placeFrankfurt 26. Jan 2026 bis 30. Jan 2026 |
placeKöln 26. Jan 2026 bis 30. Jan 2026 |
placeMadrid 26. Jan 2026 bis 30. Jan 2026 |
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabili…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Explain the importance of planning for an engagement
- Explain key legal concepts.
- Explain the importance of scoping an engagement properly.
- Explain the key aspects of compliance-based assessments.
- Given a scenario, conduct information gathering using appropriate techniques
- Given a scenario, perform a vulnerability scan.
- Given a scenario, analyse vulnerability scan results
- Explain the process of leveraging information to prepare for exploitation.
- Explain weaknesses related to specialised systems
- Compare and contrast social engineering attacks
- Given a scenario, exploit network-based vulnerabilities
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Given a scenario, exploit application-based vulnerabilities
- Given a scenario, exploit local host vulnerabilities
- Summarise physical security attacks related to facilities
- Given a scenario, perform post-exploitation techniques
- Given a scenario, use Nmap to conduct information gathering exercises
- Compare and contrast various use cases of tools
- Given a scenario, analyse tool output or data related to a penetration test
- Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
- Given a scenario, use report writing and handling best practices
- Explain post-report delivery activities
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Explain the importance of communication during the penetration testing process
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
