Course Overview
The eJPTv2 training course is designed to provide a strong foundation in Ethical Hacking and Penetration Testing by gaining hands-on experience in identifying and exploiting security vulnerabilities. Key topics of this course include Linux & Windows basics, reconnaissance, scanning, enumeration, vulnerability assessment, exploitation, privilege escalation, and report writing. Exploring Capture The Flag (CTF) contests will help an individual to understand real-world examples. By the end of this course, candidates will be empowered with the hands-on skills required to conduct penetration tests, making it an excellent starting point for those pursuing a career in cyber security. Candidates will be prepared for appearing and clearing the eJPTv2 International certification exam.
Syllabus
Chapter I – Introduction to Penetration Testing
- Overview of Penetration Testing
- Rules of Engagement (ROE)
- Understanding the Testing Lifecycle
- Setting Up the Lab Environment
Chapter II – Information Gathering
- Passive and Active Reconnaissance
- Identifying Open Ports and Services
- Footprinting and Scanning
- Gathering Information from Public Sources
- Enumerating Network and Domain Data
Chapter III – Enumeration
- Banner Grabbing and OS Fingerprinting
- Enumerating Users and Shared Resources
- Network Mapping and Protocol Identification
- System-Specific Information Collection
Chapter IV – Vulnerability Assessment
- Identifying Vulnerabilities in Network Services
- Utilizing Scanning Tools (e.g., Nessus, OpenVAS)
- Manual Vulnerability Verification
- Evaluating Risk and Impact of Vulnerabilities
Chapter V – Host-Based Exploitation
- Brute Force Attacks and Password Cracking
- Using Metasploit Framework for Exploitation
- Privilege Escalation Techniques
- Exploitation of System Vulnerabilities
- Hash Dumping and Credential Extraction
Chapter VI – Network-Based Exploitation
- Network Service Exploitation
- Man-in-the-Middle (MITM) Attacks
- ARP Spoofing and Packet Manipulation
- Exploiting Protocol Vulnerabilities
Chapter VII – Post-Exploitation
- Data Exfiltration Techniques
- Clearing Logs and Covering Tracks
- Persistent Access Methods
Chapter VIII – Web Application Basics
- Understanding HTTP Protocols
- Cookie Management and Sessions
- Introduction to Web Servers and Technologies
Chapter IX – Web Application Reconnaissance
- Directory and File Enumeration
- Hidden Parameter and Resource Discovery
- Brute Force Techniques for Login Pages
- Subdomain Enumeration
- Technology Profiling
Chapter X – Web Application Exploitation
- OWASP Top 10 Vulnerabilities
- SQL Injection, XSS, and File Upload Exploits
- Authentication Bypass and Broken Access Control
Chapter XI – Reporting and Documentation
- Writing Effective Penetration Test Reports
- Recommendations for Mitigation
- Ethical Practices in Penetration Testing