HOME > IT & Software > Penetration Testing for the eJPT Certification

Penetration Testing for the eJPT Certification

SynopsisPenetration Testing for the eJPT Certification, available at...
Penetration Testing for the eJPT Certification  No.1

Penetration Testing for the eJPT Certification, available at $74.99, has an average rating of 4.34, with 69 lectures, 7 quizzes, based on 395 reviews, and has 3421 subscribers.

You will learn about Self-study preparation for the eJPT certification (eLearnSecurity Junior Penetration Tester) An Exam Strategy that can help improve your odds of success on eJPT exam day Coverage of the techniques and tools needed for executing a basic penetration test Complete penetration testing methodology This course is ideal for individuals who are This course is designed to act as a source of self-study material for those wanting to earn the eJPT certification. This course will provide an overview of tools, techniques, and strategies relevant to the eJPT exam. It can also act as an introduction to those wishing to learn more about penetration testing and develop their careers in that direction. It is particularly useful for This course is designed to act as a source of self-study material for those wanting to earn the eJPT certification. This course will provide an overview of tools, techniques, and strategies relevant to the eJPT exam. It can also act as an introduction to those wishing to learn more about penetration testing and develop their careers in that direction.

Enroll now: Penetration Testing for the eJPT Certification

Summary

Title: Penetration Testing for the eJPT Certification

Price: $74.99

Average Rating: 4.34

Number of Lectures: 69

Number of Quizzes: 7

Number of Published Lectures: 69

Number of Published Quizzes: 7

Number of Curriculum Items: 76

Number of Published Curriculum Objects: 76

Original Price: $99.99

Quality Status: approved

Status: Live

What You Will Learn

  • Self-study preparation for the eJPT certification (eLearnSecurity Junior Penetration Tester)
  • An Exam Strategy that can help improve your odds of success on eJPT exam day
  • Coverage of the techniques and tools needed for executing a basic penetration test
  • Complete penetration testing methodology
  • Who Should Attend

  • This course is designed to act as a source of self-study material for those wanting to earn the eJPT certification. This course will provide an overview of tools, techniques, and strategies relevant to the eJPT exam. It can also act as an introduction to those wishing to learn more about penetration testing and develop their careers in that direction.
  • Target Audiences

  • This course is designed to act as a source of self-study material for those wanting to earn the eJPT certification. This course will provide an overview of tools, techniques, and strategies relevant to the eJPT exam. It can also act as an introduction to those wishing to learn more about penetration testing and develop their careers in that direction.
  • The eJPTis a 100% hands-on certification for penetration testing and essential information security skills.

    By passing the exam, a cyber security professional proves they have the core skills needed for penetration testing.  Earning this certification is a great way to separate your resume from others or show that you’re ready for a rewarding new career.

    If you want to set yourself apart from traditional certifications, but aren’t ready for the OSCPor CEH Practical, then the eJPThands-on certification might be what you’re looking for. 

    Throughout this course, we’ll be covering topics to help you self-study as you prepare for the exam. By earning the eJPTcertification, your skills in the following areas will be assessed:

  • Critical penetration testing processes and methodologies

  • Information gathering and reconnaissance

  • Basic vulnerability assessment of networks and web applications

  • Exploitation with Metasploit and Meterpreter

  • Manual exploitation of web applications

  • Scanning and profiling target systems and networks

  • Netcat for bind and reverse shells

  • Nmap for system fingerprinting and scanning

  • SQLmap for automating SQL Injection attacks

  • Burp Suite for web attacks

  • Hydra for attacking authentication

  • John The Ripper for password cracking

  • DirBuster for forced web browsing

  • TCP/IP protocol and routing

  • Local Area Network (LAN) protocols and devices

  • HTTP and web technologies

  • By analyzing the exam outline and data published to the public, we’ll anticipate the types of skills you’ll need to improve your test performance. 

    The course covers eJPT and eJPT v2 content and also provides a section dealing with skills and tools that should not be overlooked during your exam prep.  Several cheat sheet type pages are also provided as a reference for key penetration testing tools and scripting languages. 

    And as a conclusion to the course, a comprehensive exam strategy is outlined!

    Just Updated with a Additional Content section

    Get additional lessons and LIVE demonstrations of ethical hacking tools and techniques to assist you with earning the eJPT certification!

    Note:  This is unofficial training / editorial commentary on the certification, products, and skills.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: The eJPT Certification

    Lecture 2: How Does this Help My Career?

    Lecture 3: Pack Of Coders

    Chapter 2: Exam Structure

    Lecture 1: Certification Process

    Lecture 2: Performance Based Exam

    Chapter 3: Penetration Testing Approach

    Lecture 1: Methodology and Testing Approach

    Chapter 4: Information Gathering

    Lecture 1: Overview

    Lecture 2: Whois

    Lecture 3: Site Browsing

    Lecture 4: Web Crawling

    Lecture 5: Network Packet Capture

    Lecture 6: Summary

    Chapter 5: Footprinting and Scanning

    Lecture 1: Overview

    Lecture 2: Ping Sweep

    Lecture 3: Fping

    Lecture 4: Nmap – Host Scanning and OS Fingerprinting

    Lecture 5: Netcat – Web Server Fingerprinting

    Lecture 6: OpenSSL – HTTPS Web Server Fingerprinting

    Lecture 7: Summary

    Chapter 6: Vulnerability Assessment

    Lecture 1: Overview

    Lecture 2: Common Vulnerability Enumeration

    Lecture 3: Nessus

    Lecture 4: Detecting Vulnerabilities with Nmap

    Lecture 5: Summary

    Chapter 7: Web Attacks

    Lecture 1: Overview

    Lecture 2: Forced Browsing

    Lecture 3: Abusing Cookies

    Lecture 4: Session Vulnerabilities

    Lecture 5: XSS Attacks

    Lecture 6: Web Site Defacement

    Lecture 7: SQL Injection

    Lecture 8: Command Injection

    Lecture 9: Web Shells

    Lecture 10: Summary

    Chapter 8: Password and Authentication Attacks

    Lecture 1: Overview

    Lecture 2: John The Ripper

    Lecture 3: Hydra

    Lecture 4: Summary

    Chapter 9: System and Network Attacks

    Lecture 1: Overview

    Lecture 2: NetBIOS

    Lecture 3: Null Sessions

    Lecture 4: Bind and Reverse Shells

    Lecture 5: Sockets and Shells with Netcat

    Lecture 6: Metasploit Framework

    Lecture 7: Meterpreter Shell

    Chapter 10: Skills and Tools Not to be Overlooked

    Lecture 1: Build Your Own Lab

    Lecture 2: Network and System Skills

    Lecture 3: Scripting Skills

    Chapter 11: Exam Strategy

    Lecture 1: Follow the Process

    Lecture 2: Inventory Everything

    Lecture 3: Use All Resources

    Chapter 12: Additional Content

    Lecture 1: Introduction to the Additional Content Section

    Lecture 2: Scripting a Ping Sweep with PowerShell

    Lecture 3: What IfYou Could Only Use 5 Tools

    Lecture 4: Live Demo: Command Injection

    Lecture 5: Live Demo: Cookie Tampering

    Lecture 6: Live Demo: Reflective XSS

    Lecture 7: Live Demo: Shells with Netcat

    Lecture 8: Live Demo: Stealing Cookies

    Lecture 9: Web Recon with PowerShell

    Lecture 10: Visualizing the Attack Surface

    Lecture 11: TCP SYN Scanning with MSF

    Lecture 12: Discovering Web Files with MSF

    Lecture 13: IANA Port Assignments

    Lecture 14: System Level Persistence

    Lecture 15: Tunnels and Pivoting with Socat

    Lecture 16: Windows Registry for User Level Persistence

    Lecture 17: File and Content Discovery

    Chapter 13: Conclusion

    Lecture 1: Thank You

    Instructors

  • Penetration Testing for the eJPT Certification  No.2
    Pack Of Coders – POC
    Publisher at Pack Of Coders
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 12 votes
  • 3 stars: 54 votes
  • 4 stars: 136 votes
  • 5 stars: 191 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!