CompTIA PenTest+ Guide to Penetration Testing,
1st Edition

Rob Wilson

ISBN-13: 9780357950654
Copyright 2024 | Published
784 pages | List Price: USD $187.95

Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information you need to successfully pass the CompTIA PenTest+ PTO-002 certification exam and contains detailed examples, projects, and hands-on activities (including virtual machine labs and interactive online features) where you can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing, and then walks you through the process of building your own penetration testing lab of virtual machines (hosted on your own computer, which is used to practice the use of pen testing tools and methods). A final project guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.


1. Introduction to Penetration Testing.
2. Setting Up a Penetration Testing Lab.
3. Planning and Scoping.
4. Information Gathering.
5. Performing Vulnerability Scanning.
6. Exploitation Methods and Tools.
7. Network Attacks and Attack Vectors.
8. Wireless and Specialized Systems Attack Vectors and Attacks.
9. Application-Based Attack Vectors and Attacks.
10. Host Attack Vectors and Cloud Technologies Attacks.
11. Social Engineering and Physical Attacks.
12. Reporting and Communication.
13. Writing and Understanding Code.
14. The Final Penetration Testing Project.

  • Rob Wilson

    Robert S. Wilson is the Cybersecurity Curriculum Coordinator and a cybersecurity instructor for Willis College (Canada’s oldest career college). Rob created Willis College’s Software Development and Cybersecurity Analyst (CSA) programs. Willis College’s CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (Rob worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity.

  • Module objectives -- Each module begins with a detailed list of the concepts to master. This list gives you a quick reference to the module’s contents and serves as a useful study aid.

  • Figures and tables -- Numerous screenshots show you how to use security tools, including command-line tools, and how to create programs. In addition, a variety of diagrams aid you in visualizing important concepts. Tables present information in an organized, easy-to-grasp manner.

  • Hands-on activities -- One of the best ways to reinforce learning about network security and security testing is to practice using the many tools security testers use. Hands-on activities are interspersed throughout each module to give you practice in applying what you have learned.

  • A Penetration Testing Lab -- Module 2 walks you through the process of building a lab of virtual machines, hosted on your own computer, that is used for practicing the use of pen testing tools and methodologies.

  • Notes -- Notes draw your attention to helpful material related to the subject being covered. In addition, notes with the title “Security Bytes” offer real-world examples related to security topics in each module.

  • Tips -- Tips offer extra information on resources and how to solve problems.

  • Caution -- Caution icons warn you about potential mistakes or problems and explain how to avoid them.

  • Module summary -- Each module ends with a summary of the concepts introduced in the module. These summaries are a helpful way to review the material covered in each module.

  • Key terms -- All terms in the module introduced with bold text are gathered together in the key terms list at the end of the module. This useful reference encourages a more thorough understanding of the module’s key concepts. A full definition of each key term is provided in the Glossary.

  • Review questions -- The end-of-module assessment begins with review questions that reinforce the main concepts and techniques covered in each module. Answering these questions helps ensure that you have mastered important topics.

  • Case projects -- Each module closes with one or more case projects that help you evaluate and apply the material you have learned. To complete these projects, you must draw on real-world common sense as well as your knowledge of the technical topics covered to that point in the course. Your goal for each project is to come up with answers to problems similar to those you’ll face as a working security tester. To help you with this goal, many case projects are based on a hypothetical company typical of those hiring security consultants.

  • Final Project -- The final module of the course brings everything together with a final project, which guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.

Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.

Cengage Testing, powered by Cognero® for Wilson's CompTIA PenTest+ Guide to Penetration Testing

Cengage Testing, powered by Cognero® for Wilson's CompTIA PenTest+ Guide to Penetration Testing, Instant Access

Instructor's Companion Website for Wilson's CompTIA PenTest+ Guide to Penetration Testing