Am I overthinking the new Pentest+ 003?

Sean Ellars

New member
Oct 4, 2023
3
9
486
In the past, I've found that the certification exams do a pretty good job of meeting the outcomes stated at the top of the exam guide regardless of the material that is presented for the different learning objectives...ie that there is often a difference of interpretations between what gets trained and how it gets tested.

This particular exam and the course material seems to leave a lot of whitespace within the words used to define the outcomes and objectives, and the scope of the objectives (given the number of sub-topics), that a test developer can fill in ... (outcomes and a couple of objectives noted at the bottom of the post)

For example, in Pentest+ 003 what is the definition of phases, ttp's, and laws referenced in the outcomes?
a) phases that the outcomes refer to (note the domains and objectives don't follow any published pentest methodology and seem to conflate phases with tactics in mitre attack)
b) which list of tactics, techniques and procedures are we aligning the attacks, tools and phases with...(note Mitre attack is the only ttp listed but it is not used consistently in the objectives)
c) what laws and compliance/control frameworks should we be aligning the attacks with (note, I don't really see this level of detail reflected in the course material...the objectives just say security and privacy laws in 1.1 and the frameworks in objective 1.3 don't identify any control frameworks beyond the owasp masvs)

...and given the outcomes, 80+ tools and 100+ "attacks", and just 2 of the objectives (noted below), I'm led to believe that the students will need to:
1. Associate each tool with all of the relevant phases, tactics and techniques...note I don't know what the authoritative list/lists of these are
2. Be able to script the commands and switch options for every tool ... and associate those with specific attacks
3. Know the appropriate mitigations for each attack and probable root causes for each control's failure
4. Be able to identify an attack with the control or law you intend to test

so, am I overthinking what my students will need to be capable of or where the test writers may take the exam?

---------exam outcomes and objectives -----------

The exam guide identifies 4 outcomes for Pentest+ 003:
• Plan, scope, and perform information gathering as part of a penetration test.
Perform attacks that are aligned to and fulfill legal and compliance requirements.
• Perform each phase of a penetration test using and modifying appropriate tools and use the appropriate tactics, techniques, and procedures.
Analyze the results of each phase of a penetration test to develop a written report, effectively communicate findings to stakeholders and provide practical recommendations.

That said, the 26 objectives (including 15 apply and 3 analyze level of learning) list over 80 pentest tools/platforms/technologies and over 100 attacks/tactics/techniques. Including these two doozies
- Given a scenario, use scripting to automate attacks.
- Given a scenario, analyze the findings and recommend the appropriate remediation within a report.
 
Sean,
I don't believe you're overthinking this. I'm writing this as I participate in the Pentest-3 TTT. I took away from the first TTT session that being able to write scripts and scripting is required. Nick Peirce, who's presenting the TT, said as much but, more importantly, demonstrated it in both sessions. If you follow the TTT presentation over the Perform lab environment students will need to be able to use critical thinking to analyze and present results.
I don't currently hold Pentest+, but after reviewing the objectives and given what I've seen in the TTT so far, I will probably pursue this. It's very different from the previous version of the certification in a very good way.
Brian
 
Sean,
I don't believe you're overthinking this. I'm writing this as I participate in the Pentest-3 TTT. I took away from the first TTT session that being able to write scripts and scripting is required. Nick Peirce, who's presenting the TT, said as much but, more importantly, demonstrated it in both sessions. If you follow the TTT presentation over the Perform lab environment students will need to be able to use critical thinking to analyze and present results.
I don't currently hold Pentest+, but after reviewing the objectives and given what I've seen in the TTT so far, I will probably pursue this. It's very different from the previous version of the certification in a very good way.
Brian
Thanks, Brian. I agree that I see value in the cert. I like the changes. I'll have to wait and see how the TTT and material actually get us to the learning outcomes. You know what they say: doctors make the worst patients .... and teachers the worst students ;-)
 
  • Like
  • Haha
Reactions: Fanuel and Hank Cox
I don't currently hold Pentest+, but after reviewing the objectives and given what I've seen in the TTT so far, I will probably pursue this. It's very different from the previous version of the certification in a very good way.
Brian
I have done all three Pentest+ exams, all three as beta-tests. I agree with you that PT1-003 was good, at least as good as PT1-002.

In all three versions I've felt that, while it's a theoretical exam, the exam does properly test for things you'd learn in the field as opposed to "from books". Next to Linux+ (or at least versions 4 and 5) Pentest+ is one of CompTIA's best exams. It's a shame I really dislike XK1-006 (to such a point that I'm ditching it for my classes).