5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     CompTIA PenTest+ (PT0-002)
Penetration testing is a coordinated and simulated cyberattack used to evaluate the security of a computer system or computer network. The initial and critical planning phase of penetration testing is key to a successful engagement process. In this course, you'll explore the fundamentals of penetration testing, including a comparison of governance, risk, and compliance concepts. You'll examine legal concepts such as service level agreements, statements of work, non-disclosure agreements, and master service agreements. You'll learn the importance of scoping and organizational and customer requirements, including common standards and methodologies, rules of engagement, environmental considerations, target list definition, and scope of the engagement validation. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

Objectives

CompTIA PenTest+ (PT0-002): Scoping & Engagement

  • discover the key concepts covered in this course
  • recognize compliance considerations such as Payment Card Industry Data Security Standard (PCI DSS) and General Data Protection Regulation (GDPR)
  • list geographical location restrictions such as country limitations, tool restrictions, local laws, and local government requirements
  • describe when to use service level agreements (SLAs)
  • recognize the importance of protecting confidentiality during penetration testing exercises
  • recognize what details should be included in a penetration testing statement of work
  • recognize key components of a non-disclosure agreement
  • list the benefits of defining a master server agreement prior to penetration testing
  • describe how to use approval forms to document the permission to attack
  • recognize common standards and methodologies including MITRE ATT&CK, Open Web Application Security Project (OWASP), and the National Institute of Standards and Technology (NIST)
  • recognize how clearly defined rules of engagement can help document the expectations of penetration testing
  • recognize environmental considerations such as network, application, and cloud
  • recognize how to define target lists such as wireless networks, domain, and physical locations
  • recognize how to validate the scope of engagement using strategies such as time management and client contract review
  • summarize the key concepts covered in this course