Save 70% on video courses when you use code OCTVID during checkout. Offer ends Oct. 17. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Learn, prepare, and practice for CompTIA Pentest+ PT0-002 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification.
CompTIA Pentest+ Cert Guide presents the material in a concise manner, focusing on increasing your understanding and retention of exam topics. Best-selling author Omar Santos and leading IT security expert Ron Taylor share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.
The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
The CompTIA study guide helps you master all the topics on the Pentest+ exam, including:
Previous Edition Table of Contents
1 Introduction to Ethical Hacking and Penetration Testing
2 Planning and Scoping a Penetration Testing Assessment
3 Information Gathering and Vulnerability Identification
4 Social Engineering Attacks and Physical Security Vulnerabilities
5 Exploiting Wired and Wireless Networks
6 Exploiting Application-Based Vulnerabilities
7 Cloud, Mobile, and IoT Security
8 Performing Post-Exploitation Techniques
9 Reporting and Communication
10 Tools and Code Analysis
11 Final Preparation