CompTIA PenTest+ is a certification for intermediate skill level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report and manage vulnerabilities on a network. Gaining your PenTest+ certification, issued through CompTIA, will advance your cybersecurity career opportunities.
PenTest+ maps 100% to the NICE/NIST Cybersecurity Workforce Framework (NCWF) v2.0 Related Work Role of Vulnerability Assessment Analyst. This is used by the U.S. DoD for determining cybersecurity work roles.
MedCerts training programs are some of the most competitively price ways to start a new career.
|MedCerts||Community College||Online College|
|Program & Tuition Cost||$4,000 average||Up to $20,000||$3,000 average|
|Exam Fees, Books & Materials||Included||Up to $750||Up to $750|
|Job Ready In||3–6 months||24–48 months||3–6 months|
|Schedule Flexibility||On-demand 24/7||Set class schedule||On-demand 24/7|
|Travel Requirements||None: 100% online||On-campus classrooms||None: 100% online|
|Student Support||Personal Advisors: text, call, and email access||Professors: scheduled office hours||Support inbox|
|Career Coaching||Exam-tailor + soft-skill training to build well-rounded careers||Exam-based + prerequisites and electives to meet credit hour requirements||Exam-specific only|
|Content Delivery||3D animations, immersive environments, interactive activities, game-based learning||Professor lectures||Varies: typically videos and presentations|
This table is provided for reference only. Actual pricing may vary or change without notice. Pricing is based on an estimated full-cost tuition with fees for a Medical Assistant program or similar program before financial aid or other assistance. Data sampled from MedCerts, Oakland Community College, and Kaplan University.
Penetration Tester/Vulnerability Analyst probe for and exploits security vulnerabilities in web-based applications, networks and systems. Penetration Tests are designed to achieve a specific, attacker-simulated goal and should be requested by customers who are already at their desired security posture. A typical goal could be to access the contents of the prized customer database on the internal network, or to modify a record in an HR system. Vulnerability Assessments are designed to yield a prioritized list of vulnerabilities and are generally for clients who already understand they are not where they want to be in terms of security. The customer already knows they have issues and simply need help identifying and prioritizing them.
An Incident Analyst/Responder Investigates an IT-related incident: an unplanned interruption to a service, a reduction in the quality of a service, or an event that has not yet impacted the service to the customer. Works to restore a normal service operation as quickly as possible and to minimize the impact on business operations.
Cybersecurity Analysts work on monitoring, controlling, and maintaining systems that protect the security of large databases, including databases with customer information and patient files. Analyzes the examination of client computer systems, identification of weak points in security, development and implementation of new systems, and monitoring and response to security issues.