Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Information Gathering and Vulnerability Identification for CompTIA PenTest+

via Pluralsight


This course is a part 5 of the CompTIA PenTest+ series. You have identified the vulnerabilities, now you will use your toolset to identify how to exploit said vulnerabilities to prepare to for exploitation.

Now that you have finished identifying, enumerating, and uncovering vulnerabilities through your active and passive reconnaissance efforts, you have to now figure out what do with this data. In this course, Information Gathering and Vulnerability Identification for CompTIA PenTest+, you will learn foundational knowledge of and gain the ability to analyze the vulnerabilities you've discovered. First, you will learn how to choose the right vulnerability scanner, be it open-source or commercial, on-prem or cloud-based. Next, you will discover how to organize said data by categorizing the assets, identifying false-positives and preparing for adjudication. Finally, you will explore how to transform this data into actionable exploits. When you’re finished with this course, you will have the skills and knowledge of analyzing the vulnerabilities or order to prepare for the next stage of the penetration testing lifecycle.

  • Course Overview
  • Comparing Different Vulnerability Scanners
  • Interpreting What You Have Found
  • Explaining How to Utilize the Data for Exploitation

Taught by

Dale Meredith

Related Courses


Start your review of Information Gathering and Vulnerability Identification for CompTIA PenTest+

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free