CompTIA PenTest+ Specialization
via Coursera Specialization
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This specialization provides comprehensive preparation for the CompTIA PenTest+ certification and equips learners with the hands-on penetration testing skills demanded by today's cybersecurity industry. Spanning four modular courses and approximately 17 hours of expert video instruction, the specialization covers the complete penetration testing lifecycle: from planning and legal scoping, through reconnaissance, vulnerability scanning, and network exploitation, to web and cloud attacks, social engineering, post-exploitation, and professional reporting.
Syllabus
- Course 1: PenTest Planning & Information Gathering
- Course 2: Vulnerability Scanning Network Attacks
- Course 3: Application, Cloud, and Specialized Attacks
- Course 4: PenTest Post-Exploitation, Reporting & Tools
Courses
-
This course expands the learner’s hacking toolkit to cover approximately 3 hours and 30 minutes of expert instruction across five focused modules. Web Application and Database Attacks opens the course, covering SQL injection, cross-site scripting, CSRF, API attacks, and hands-on Labtainers labs. Privilege Escalation and Local Host Attacks then addresses what happens after gaining a foothold — covering Linux and Windows privilege escalation and miscellaneous local host vulnerabilities. Attacking the Cloud addresses misconfigurations and exploitation in AWS, Azure, and other cloud environments. Specialized and Fragile Systems introduces testing approaches for mobile devices, virtual and containerized environments, and industrial control systems. The course closes with Social Engineering and Physical Attacks, covering phishing campaigns, spear phishing, in-person social engineering, and physical security assessments.
-
This course launches the CompTIA PenTest+ Specialization with the foundational skills every professional penetration tester must master before a single packet is sent. Organized into three focused learning modules — PenTest+ Orientation and Engagement Fundamentals, Engagement Planning: Compliance, Standards & Scoping, and Reconnaissance and Information Gathering — learners develop the methodology, legal understanding, and information-gathering techniques that define a successful pen test across approximately 4 hours of expert instruction. Learners benefit by gaining the ability to scope and legally authorize a penetration test, navigate rules of engagement, apply frameworks such as MITRE ATT&CK and OWASP, and perform passive and active reconnaissance using real-world OSINT techniques and scanning tools. This course emphasizes decision-making under realistic constraints — client communication, regulatory compliance, and risk planning — skills that are as critical in the field as any exploit. By the end of this course, learners will be able to structure a professional penetration testing engagement from contract to kickoff and begin building an intelligence picture of any target environment.
-
This capstone course completes the CompTIA PenTest+ Specialization with approximately 4 hours and 45 minutes of expert instruction across post-exploitation techniques, post-engagement reporting, tools and code analysis, and an extensive tools inventory. Learners master what happens after initial system compromise and how to bring an engagement to a professional close. Learners benefit by gaining practical skills in maintaining access, lateral movement, covering tracks, and cleaning up after a test — critical competencies for any ethical hacker. The course also develops professional communication skills through structured report writing, including findings, risk ratings, and remediation guidance. An extensive tour of the penetration testing toolkit — Metasploit, Wireshark, Kali Linux, Burp Suite, password crackers, and scripting in Bash, PowerShell, and Python — equips learners with a practical arsenal. By the end of this course, learners will be able to complete a full penetration test lifecycle from initial access through professional reporting.
-
This course moves from reconnaissance into active exploitation, covering approximately 4 hours and 50 minutes of expert instruction across four focused modules. In Vulnerability Scanning Fundamentals, learners are introduced to the scanning process with live demos and hands-on Nmap labs. Advanced Scanning and Credential Attacks then deepens that foundation — covering target considerations, scan analysis, Nmap scoping and timing, vulnerability prioritization using CVSS and EPSS scoring, and credential attack techniques including password cracking labs. Network-Based Attacks shifts into exploitation, covering man-in-the-middle techniques, ARP spoofing, DNS attacks, and service exploitation. The course closes with Wireless and RF Attacks, exploring WPA2 handshake cracking, evil twin access points, Bluetooth vulnerabilities, and other RF-based attack techniques. Learners benefit by gaining practical skills in vulnerability analysis, network protocol exploitation, man-in-the-middle attacks, packet manipulation, and wireless network cracking — techniques directly applicable to real-world red team engagements and defensive security roles. The course integrates Labtainers hands-on labs with Nmap, Wireshark, and Metasploit, bridging the gap between theory and practice. By the end of this course, learners will be able to conduct a full vulnerability scanning cycle and exploit common network and wireless vulnerabilities in a controlled, authorized environment.
Taught by
Michael Solomon