Popular Topics
CompTIA Security+
Certified in Cybersecurity Training
CISSP
Risk and Compliance
Certified in Governance
CISSP Exam Preparation Course
CompTIA Cybersecurity Analyst
Certified Cloud Security Professional
Chief Information Security Officer
Penetration Testing Professional
CompTIA
Certified Secure Software Lifecycle Professional
Cybersecurity Analyst
Network Defender
CompTIA PenTest
All Cybersecurity Courses
Cybersecurity Online Training Courses - Live
Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.![](https://www.ccslearningacademy.com/wp-content/uploads/2023/10/comptia-authorized-partner-1-150x150.webp)
![ISACA_partnerlogo](https://www.ccslearningacademy.com/wp-content/uploads/2022/10/ISACA_partnerlogo-300x188.png)
![](https://www.ccslearningacademy.com/wp-content/uploads/2023/10/category_ec-council-300x180.png)
![](https://www.ccslearningacademy.com/wp-content/uploads/2023/10/isc2-logo-rec-300x180.webp)
Filter by Topic
Filter by Vendor
CompTIA PenTest+
Course Description Security remains one of the hottest topics in …
What you'll learn
Plan and scope penetration tests.
Conduct passive reconnaissance.
Perform non-technical tests to gather information.
Conduct active reconnaissance.
Analyze vulnerabilities.
Penetrate networks.
Exploit host-based vulnerabilities.
Test applications.
Complete post-exploit tasks.
Analyze and report pen test results.