A Logical Learning module: penetration testing methodology, Cornell note outlines, and a hands-on Nmap reconnaissance lab aligned with PenTest+ (PT0-002) exam objectives.
Penetration testing — commonly known as pentesting — is the authorized simulation of cyberattacks against computer systems to evaluate their security posture. The practice is governed by established methodologies including the Penetration Testing Execution Standard (PTES), which defines seven phases from pre-engagement interactions through exploitation and reporting (PTES, 2014). The National Institute of Standards and Technology's Special Publication 800-115 provides technical guidance for information security testing and assessment, emphasizing that penetration testing should be part of a comprehensive security assessment program (NIST, 2008). CompTIA's PenTest+ certification validates the skills required to plan and scope engagements, conduct passive and active reconnaissance, perform vulnerability analysis, execute attacks, and communicate findings — making it the industry-recognized credential for intermediate-level penetration testers (CompTIA, 2025).
The PenTest+ (PT0-002) exam covers six domains: Engagement Management (13%), Reconnaissance and Enumeration (21%), Vulnerability Discovery and Analysis (17%), Attacks and Exploits (21%), Post-Exploitation and Lateral Movement (13%), and Reporting and Communication (15%) (CompTIA, 2025). The OWASP Testing Guide provides complementary methodologies for web application security testing, while the Open Source Security Testing Methodology Manual (OSSTMM) offers a scientific methodology for operational security testing (OWASP, 2023; Herzog, 2010). Understanding these frameworks is essential for penetration testers who must operate within legal boundaries, maintain ethical standards, and produce actionable reports that drive remediation.
Engagement management establishes the legal, ethical, and logistical foundation for every penetration test.
Reconnaissance is the largest exam domain — master OSINT techniques and Nmap scanning to build a complete target profile.
Vulnerability discovery bridges reconnaissance and exploitation — accurate analysis prevents wasted effort on false positives.
Attacks and exploits is the highest-weighted domain — hands-on practice with Metasploit and Burp Suite is essential.
Post-exploitation demonstrates real-world impact — showing what an attacker could access after initial compromise.
A penetration test is only as valuable as its report — clear communication turns technical findings into organizational action.
Objective: Perform host discovery and service enumeration against a target network to identify attack surfaces.
Prerequisites: Kali Linux VM, target network (recommend TryHackMe or HackTheBox free labs)
The -sn flag performs a ping sweep without port scanning, identifying which hosts are alive on the subnet.
SYN scan (-sS) sends SYN packets without completing the TCP handshake — faster and harder to detect than a full connect scan.
-sV probes open ports to determine service/version info. -sC runs default NSE scripts for additional enumeration.
-O enables OS detection using TCP/IP stack fingerprinting. --osscan-guess provides more aggressive guessing when results are uncertain.
-oA outputs in all formats (normal, XML, grepable) for documentation and report generation.
Creators of Kali Linux and the OSCP certification — the gold standard for hands-on penetration testing skills.
Visit OffSecHome of the Certified Ethical Hacker (CEH) certification — one of the most recognized credentials in ethical hacking worldwide.
Visit EC-CouncilOffers the GPEN certification and world-class cybersecurity training through immersive, expert-led courses.
Visit SANSBeginner-friendly, gamified hands-on labs for learning penetration testing and cybersecurity fundamentals step by step.
Visit TryHackMeAdvanced penetration testing labs and challenges for experienced practitioners seeking real-world exploitation scenarios.
Visit HackTheBoxYour contribution funds lab environments, study materials, and student access to hands-on pentesting resources.
GoFundMe — Support Open-Source Teaching & Research