Total Seminars

CompTIA PenTest+ Specialization Specialization

Total Seminars

CompTIA PenTest+ Specialization Specialization

Michael Solomon

Instructor: Michael Solomon

Access provided by Masterschool

Get in-depth knowledge of a subject
Advanced level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Advanced level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • How to plan, scope, and systematically execute penetration tests using industry-standard methodologies including MITRE ATT&CK, OWASP, and PTES

  • How to identify, exploit, and document vulnerabilities across networks, web applications, and specialized systems including IoT and mobile devices

  • How to conduct post-exploitation activities, maintain access,and produce penetration test reports with actionable remediation recommendations

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2026

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Total Seminars

Specialization - 4 course series

PenTest Planning & Information Gathering

PenTest Planning & Information Gathering

Course 1, 5 hours

What you'll learn

  • How to plan, scope, and document a penetration testing engagement including rules of engagement, NDAs, SOWs, and regulatory compliance requirements

  • How to perform passive and active reconnaissance using OSINT tools and techniques to build a comprehensive intelligence picture of a target

  • How to apply industry-standard penetration testing frameworks (MITRE ATT&CK, PTES, CREST) to structure and prioritize a professional engagement

Skills you'll gain

Category: Penetration Testing
Category: Vulnerability Assessments
Category: Technical Communication
Category: Vulnerability Scanning
Category: Risk Management Framework
Category: Cyber Security Assessment
Category: Scope Management
Category: Cyber Threat Intelligence
Category: Regulatory Compliance
Category: Security Testing
Category: MITRE ATT&CK Framework
Category: Ethical Standards And Conduct
Category: Open Web Application Security Project (OWASP)
Category: Test Planning
Category: Network Analysis
Category: Drive Engagement
Category: OSI Models
Vulnerability Scanning Network Attacks

Vulnerability Scanning Network Attacks

Course 2, 5 hours

What you'll learn

  • How to use vulnerability scanning tools (Nmap, Wireshark, Metasploit) to identify security weaknesses using CVSS and EPSS scoring frameworks

  • How to perform network-based attacks including man-in-the-middle, ARP manipulation, and service exploitation against real and simulated targets

  • How to identify and exploit wireless network vulnerabilities including WPA2 handshake attacks and RF-based attack vectors such as Bluetooth exploits

Skills you'll gain

Category: Wireless Networks
Category: Penetration Testing
Category: Network Analysis
Category: Network Protocols
Category: Vulnerability Management
Category: Vulnerability Scanning
Category: Security Engineering
Category: Cyber Security Assessment
Category: Network Security
Category: Vulnerability Assessments
Category: Brute-force attacks
Category: Data Manipulation
Category: Exploitation techniques
Category: Network Monitoring
Category: Network Troubleshooting
Category: Metasploit
Application, Cloud, and Specialized Attacks

Application, Cloud, and Specialized Attacks

Course 3, 4 hours

What you'll learn

  • How to identify and exploit web application and database vulnerabilities including SQL injection, XSS, and privilege escalation techniques

  • How to assess cloud infrastructure security and exploit misconfigurations in AWS, Azure, and other cloud platforms during an authorized engagement

  • How to conduct social engineering simulations, and perform assessments on specialized systems including IoT devices and industrial control systems

Skills you'll gain

Category: Penetration Testing
Category: Cloud Security
Category: Mobile Security
Category: Human Factors (Security)
Category: Virtualization
Category: Exploitation techniques
Category: Web Applications
Category: SQL
Category: Security Testing
Category: Application Programming Interface (API)
Category: Databases
Category: Cloud Infrastructure
Category: Cybersecurity
Category: Security Strategy
Category: Scripting Languages
Category: Cloud Platforms
Category: Vulnerability Assessments
Category: Azure DevOps
Category: AWS Identity and Access Management (IAM)
Category: Mobile Development Tools
PenTest Post-Exploitation, Reporting & Tools

PenTest Post-Exploitation, Reporting & Tools

Course 4, 6 hours

What you'll learn

  • How to maintain access, move through a network, and cover tracks after initial system compromise using professional post-exploitation techniques

  • How to write clear penetration test reports with findings categorized by severity, risk-rated remediation recommendations, and executive summaries

  • How to use and script with the penetration testing toolkit including Metasploit, Wireshark, Burp Suite, Kali Linux, and Bash/Python automation

Skills you'll gain

Category: Penetration Testing
Category: Metasploit
Category: Vulnerability Scanning
Category: Python Programming
Category: Exploitation techniques
Category: Bash (Scripting Language)
Category: Linux
Category: Code Review
Category: Security Awareness
Category: Security Requirements Analysis
Category: Applicant Tracking Systems
Category: Technical Communication
Category: Technical Writing
Category: Scripting
Category: Exploit development
Category: Persistence
Category: Technical Documentation
Category: Security Testing
Category: Security Engineering
Category: Windows PowerShell

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Michael Solomon
Total Seminars
4 Courses45 learners

Offered by

Total Seminars

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."