Giter Site home page Giter Site logo

ejpt-pts-course-study-plan's Introduction

EJPT-PTS-Course-Study-Plan

This is a study plan for the official materials and content from INE for the Penetration Testing Student (PTS) course materials.

How It Works

The materials are divided into courses. Each course contain videos and labs. Some video have labs along with them, and others do not.

I gave each video that has no lab 2x its time to watch and the video and write notes about it. If the video has a lab you should spend 3x its time for watching it, applying the lab, and writing your notes.

You can either watch the complete first and then apply the lab, or apply the lab while you watch the video (follow instructions and apply then step-by-step). Personally, I found the second one is better for me as it took less time compared to the first one.

Daily Goal

The goal is to spend around 2-3 hours each day studying the course materials. Note that this study plan does not consider time for revision or practicing what you have learned through CTFs. You can manage this on your own on the pace that suits you.

This repository contains a list of good THM rooms to do for the eJPT exam. Thanks to N1NJ10!

Note

A note here, you do not have to do all CTFs before the exam. Personally, I did not do any CTF before the exam - except the black-box machines that were provided during the course, and I managed to pass the exam.

However, I recommend you doing some machines before the exam as this will make the exam more easy for you to pass. Inshallah I will write about my exam experience soon and I will leave a reference for it here!

Besides, I noticed that the course content was added to it. When I took the certification two months ago from the dates I am writing the repo in, the content length was 148h. Now, it is more than 156h. So, this plan is according to the length 156h 17m according to the official site.

Section 1: Assessment Methodologies

Course 1: Assessment Methodologies: Information Gathering

Day 1: 2h20min - [Fork the repo and put your dates here for better accountability :)]

Welcome - Introduction
  1. Introduction - 6m18s (15min)
Introduction To Information Gathering
  1. Introduction To Information Gathering - 9m22s (20min)
Lessons - Passive Information Gathering
  1. Website Recon & Footprinting - 20m55s (40min)
  2. Whois Enumeration - 7m56s (15min)
  3. Website Footprinting With Netcraft - 10m47s (20min)
  4. DNS Recon - 13m34s (30min)

Day 2: 2h

  1. WAF With wafw00f - 7m31s (15min)
  2. Subdomain Enumeration With Sublist3r - 11m36s (20min)
  3. Google Dorks - 22m51s (45min)
  4. Email Harvesting With theHarvester - 13m (25min)
  5. Leaked Password Databases - 8m (15min)

End of Passive Information Gathering section.

Day 3: 2h30min

Lessons - Active Information Gathering
  1. DNS Zone Transfers - 28m15s (1h)
  2. Host Discovery With Nmap - 7m2s (15min)
  3. Port Scanning With Nmap - 26m17s (1h15min)
Goodbye - Conclusion
  1. Course Conclusion - 1m13s

End of Course 1!

Course 2: Assessment Methodologies: Footprinting & Scanning

Obviously, this course was updated (so the content went from 148h to 156h). I remember it was around 5h long. now it is around 11h. They added some good stuff.

Day 4: 2h

Welcome - Introduction
  1. Course Introduction - 12m17s (15min)
Lessons - Introduction
  1. Active Information Gathering - 7m18s (15min)
Lessons - Networking Primer
  1. Networking Fundamentals - 15m38s (30min)
  2. Network Layer - 31m42s (1h)

Day 5: 2h

  1. Transport Layer - Part 1 - 21m48s (40min)
  2. Transport Layer - Part 2 - 15m56s (30min)
Lessons - Host Discovery
  1. Netowrk Mapping - 13m3s (30min)
  2. Host Discovery Techniques - 10m5s (20min)

Day 6: 2h40min

  1. Ping Sweeps - 23m28s (50min)
  2. Host Discovery With Nmap - Part 1 - 23m29s (50min)
  3. Host Discovery With Nmap - Part 2 - 27m30s (1h)

Day 7: 3h20min

Lessons - Port Scanning
  1. Port Scanning With Nmap - Part 1 - 17m32s (40min)
  2. Port Scanning With Nmap - Part 2 - 19m28s (40min)
  3. Service Version & OS Detection - 16m18s (30min)
  4. Nmap Scripting Engine (NSE) - 32m24s (1h30min)

Day 8: 2h50min

Lesson - Firewall/IDS Evation
  1. Firewall Detection & IDS Evasion - 26m22s (1h)
Lesson - Scan Timing & Performance
  1. Optimizing Nmap Scans - 20m24s (40min)
Lesson - Output & Verbosity
  1. Nmap Output Formats - 22m6s (1h)
Goodbye - Conclusion
  1. Course Conclusion - 9m17s

Day 9:

Additional Labs
  1. Windows Recon: Zenmap - 15min
  2. Scan the Server 2 - 15min
  3. Scan the Server 3 - 15min

ejpt-pts-course-study-plan's People

Contributors

omar-danasoury avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.