PHONE

+44 330 133 4431

SUPPORT

enquiries@ausarsec.com

CompTIA Labs for PenTest+ (PT0-001)

Individual Licence | Intermediate | eLearning | Valid for 12 months

£118.00 + VAT

What You’ll learn

CompTIA Labs hosted by Learn on Demand Systems allow for hands on practice and skill development in actual software applications through a remote lab environment. The browser-based virtual labs align with CompTIA exam objectives and are based on scenarios found in the workplace. The labs within each course are independent of each other and can be used in any order.

Labs Available:

  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results

Prerequisites

Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet

 

Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
Describe the key elements of Check Point’s unified Security Management Architecture.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.
Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a unified Security Policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement backup techniques.
Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN deployments and communities.

Why choose Aursarsec

  • Our instructors make learning fun,
  • Years of cybersecurity experience
  • Years of training experience
  • Personalised experience
  • Dedicated labs
  • Read more about Ausarsec

What You’ll learn

CompTIA Labs hosted by Learn on Demand Systems allow for hands on practice and skill development in actual software applications through a remote lab environment. The browser-based virtual labs align with CompTIA exam objectives and are based on scenarios found in the workplace. The labs within each course are independent of each other and can be used in any order.

Labs Available:

  • Planning and Scoping Penetration Tests
  • Conducting Passive Reconnaissance
  • Performing Non-Technical Tests
  • Conducting Active Reconnaissance
  • Analyzing Vulnerabilities
  • Penetrating Networks
  • Exploiting Host-Based Vulnerabilities
  • Testing Applications
  • Completing Post-Exploit Tasks
  • Analyzing and Reporting Pen Test Results

Prerequisites

Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet

 

Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
Describe the key elements of Check Point’s unified Security Management Architecture.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.
Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a unified Security Policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement backup techniques.
Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN deployments and communities.

Why choose Aursarsec

  • Our instructors make learning fun,
  • Years of cybersecurity experience
  • Years of training experience
  • Personalised experience
  • Dedicated labs
  • Read more about Ausarsec