Total Seminars

CompTIA PenTest+ Specialization Specialization

Total Seminars

CompTIA PenTest+ Specialization Specialization

Michael Solomon

Instructor: Michael Solomon

Included with Coursera Plus

Get in-depth knowledge of a subject
Advanced level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Advanced level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • How to plan, scope, and systematically execute penetration tests using industry-standard methodologies including MITRE ATT&CK, OWASP, and PTES

  • How to identify, exploit, and document vulnerabilities across networks, web applications, and specialized systems including IoT and mobile devices

  • How to conduct post-exploitation activities, maintain access,and produce penetration test reports with actionable remediation recommendations

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2026

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Total Seminars

Specialization - 4 course series

PenTest Planning & Information Gathering

PenTest Planning & Information Gathering

Course 1, 5 hours

What you'll learn

  • How to plan, scope, and document a penetration testing engagement including rules of engagement, NDAs, SOWs, and regulatory compliance requirements

  • How to perform passive and active reconnaissance using OSINT tools and techniques to build a comprehensive intelligence picture of a target

  • How to apply industry-standard penetration testing frameworks (MITRE ATT&CK, PTES, CREST) to structure and prioritize a professional engagement

Skills you'll gain

Category: Open Web Application Security Project (OWASP)
Category: Vulnerability Scanning
Category: Penetration Testing
Category: Scope Management
Category: Drive Engagement
Category: Ethical Standards And Conduct
Category: Cyber Security Assessment
Category: Regulatory Compliance
Category: MITRE ATT&CK Framework
Category: Vulnerability Assessments
Category: Network Analysis
Category: Technical Communication
Category: OSI Models
Category: Security Testing
Category: Cyber Threat Intelligence
Category: Test Planning
Category: Risk Management Framework
Vulnerability Scanning Network Attacks

Vulnerability Scanning Network Attacks

Course 2, 5 hours

What you'll learn

  • How to use vulnerability scanning tools (Nmap, Wireshark, Metasploit) to identify security weaknesses using CVSS and EPSS scoring frameworks

  • How to perform network-based attacks including man-in-the-middle, ARP manipulation, and service exploitation against real and simulated targets

  • How to identify and exploit wireless network vulnerabilities including WPA2 handshake attacks and RF-based attack vectors such as Bluetooth exploits

Skills you'll gain

Category: Network Security
Category: Network Troubleshooting
Category: Brute-force attacks
Category: Penetration Testing
Category: Metasploit
Category: Vulnerability Assessments
Category: Security Engineering
Category: Data Manipulation
Category: Vulnerability Scanning
Category: Wireless Networks
Category: Cyber Security Assessment
Category: Network Protocols
Category: Network Monitoring
Category: Exploitation techniques
Category: Network Analysis
Category: Vulnerability Management
Application, Cloud, and Specialized Attacks

Application, Cloud, and Specialized Attacks

Course 3, 4 hours

What you'll learn

  • How to identify and exploit web application and database vulnerabilities including SQL injection, XSS, and privilege escalation techniques

  • How to assess cloud infrastructure security and exploit misconfigurations in AWS, Azure, and other cloud platforms during an authorized engagement

  • How to conduct social engineering simulations, and perform assessments on specialized systems including IoT devices and industrial control systems

Skills you'll gain

Category: Human Factors (Security)
Category: Penetration Testing
Category: Security Testing
Category: Cloud Infrastructure
Category: SQL
Category: Web Applications
Category: Mobile Security
Category: Cybersecurity
Category: Application Programming Interface (API)
Category: Mobile Development Tools
Category: Exploitation techniques
Category: Cloud Platforms
Category: Security Strategy
Category: Vulnerability Assessments
Category: AWS Identity and Access Management (IAM)
Category: Azure DevOps
Category: Scripting Languages
Category: Cloud Security
Category: Databases
Category: Virtualization
PenTest Post-Exploitation, Reporting & Tools

PenTest Post-Exploitation, Reporting & Tools

Course 4, 6 hours

What you'll learn

  • How to maintain access, move through a network, and cover tracks after initial system compromise using professional post-exploitation techniques

  • How to write clear penetration test reports with findings categorized by severity, risk-rated remediation recommendations, and executive summaries

  • How to use and script with the penetration testing toolkit including Metasploit, Wireshark, Burp Suite, Kali Linux, and Bash/Python automation

Skills you'll gain

Category: Security Testing
Category: Technical Communication
Category: Security Engineering
Category: Python Programming
Category: Security Requirements Analysis
Category: Security Awareness
Category: Code Review
Category: Persistence
Category: Exploit development
Category: Bash (Scripting Language)
Category: Linux
Category: Metasploit
Category: Applicant Tracking Systems
Category: Vulnerability Scanning
Category: Windows PowerShell
Category: Technical Writing
Category: Penetration Testing
Category: Exploitation techniques
Category: Technical Documentation
Category: Scripting

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Michael Solomon
Total Seminars
4 Courses5 learners

Offered by

Total Seminars

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions