Course Overview:

PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

 

 

 

 

What’s Included:

  • 5 days of instructor led in classroom training
  • Labs
  • PenTest+ Courseware
  • Exam Voucher
  • PenTest+ onsite exam scheduling

Course Objectives:

  • Plan and scope penetration tests
  • Conduct passive reconnaissance
  • Perform non-technical tests to gather information
  • Conduct active reconnaissance
  • Analyze vulnerabilities
  • Penetrate networks
  • Exploit host-based vulnerabilities
  • Test application
  • Complete post-exploit tasks
  • Analyze and report pen test results

Dates/Locations:

No Events

Duration: 5 Days

Course Content:

    • Module 01. Planning and Scoping Penetration Tests
    • Module 02. Conducting Passive Reconnaissance
    • Module 03. Performing Non-Technical Tests
    • Module 04. Conducting Active Reconnaissance
    • Module 05. Analyzing Vulnerabilities
    • Module 06. Penetrating Networks
    • Module 07. Exploiting Host-Based Vulnerabilities
    • Module 08. Testing Applications
    • Module 09. Completing Post-Exploit Tasks
    • Module 10. Analyzing and Reporting Pen Test Results

 

Prerequisites:

Target Audience:

This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 12/08/2025 – 12/11/2025
    • San Antonio
  • CT-425: CompTIA Advanced Security Practitioner (CASP+)
    • 12/08/2025 – 12/12/2025
    • San Antonio
  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • in   

    Course Overview:

    This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

    Duration: 5 Days

    Audience:

    Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisite:
    • Network+

    Dates/Locations:

    No Events

    Course Outline:

    DAY ONE

    Course Set Up and Analyzer Testing

    Network Analysis Overview
    Wireshark Functionality Overview
    Capturing Wired and Wireless Traffic
    Define Global and Personal Preferences for Faster Analysis
    Defined Time Values and Interpret Summaries
    Interpret Basic Trace File Statistics to Identify Trends
    Create and Apply Display Filters for Efficient Analysis

    DAY TWO

    Follow Streams and Reassemble Data
    Use Wireshark’s Expert System to Identify Anomalies
    TCP/IP Analysis Overview
    Analyze Common TCP/IP Traffic Patterns

    DAY THREE

    Graph I/O Rates and TCP Trends
    802.11 (WLAN) Analysis Fundamentals
    Voice over IP (VoIP) Analysis Fundamentals
    Network Forensics Fundamentals

    DAY FOUR

    Detect Scanning and Discovery Processes
    Analyze Suspect Traffic

    DAY FIVE

    Use Command‐Line Tools

    Next/Related Courses:

     

     

    Course Overview:

    This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM.  Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.

    Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.

    At the end of this course, you should understand the features and operations of View and be able to:

    • Install and configure View components
    • Create and manage dedicated and floating desktop pools
    • Deploy and manage linked-clone virtual desktops
    • Configure and manage desktops that run in local mode
    • Configure secure access to desktops through a public network
    • Use ThinApp to package applications

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Module 1: Course Introduction
    • Module 2: Introduction to VMware View
    • Module 3: View Connection Server
    • Module 4: View Desktops
    • Module 5: View Client Options
    • Module 6: View Administratory
    • Module 7: Configuring and Managing Linked Clones
    • Module 8: Local-Mode Desktops
    • Module 9: Command-Line Tools and Backup Options
    • Module 10: Managing VMware View Security
    • Module 11: View Manager Performance and Scalability
    • Module 12: VMware® ThinAppTM

    Prerequisites:

    • VM-315: VMware Infrastructure: Install, Configure and Manage
    • Experience in Microsoft Windows Active Directory Administration
    • Experience with VMware vSphereTM
    • Before attending the course, students must be able to perform the following tasks:
      • Create a template in VMware vCenterTM Server and deploy a virtual machine from it
      • Modify a template customization file
      • Open a virtual machine console in vCenter Server and access the guest operating system
      • Configure Active Directory services

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.

    Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Information Security and Open Source Software
    • Operating System Tools
    • Firewalls
    • Scanners
    • Vulnerability Scanners
    • Network Sniffers
    • Intrusion Detection Systems
    • Analysis and Management Tools
    • Encryption Tools
    • Wireless Tools
    • Forensic Tools
    • More on Open Source Software

    Prerequisites:

    • Experience in IT Security
    • Solid basic knowledge of networks and TCP/IP
    • Experience in command line under Linux and Windows is required

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!