Call 1-800-305-3855 for more information on available plans and pricing
Study at your own pace
PTS comes with life-time access to course material and flexible access to the world’s best virtual labs on Penetration Testing : Hera Lab
PTS provides a number of exercises in the most sophisticated virtual lab on Penetration testing: Hera Lab.
Tailored for Beginners
PTS starts from the very basics and covers Networking and Programming skills every Penetration tester should have
Course at a Glance
- For absolute beginners in IT Security
- Minimal pre-requisites
- Provides Networking skills
- Routing, Forwarding, TCP/IP
- Analyse traffic with Wireshark
- Provides Development skills
- Write your first C program
- Write your first Python script
- Provides Penetration testing skills
- Information gathering
- Basic usage of nmap and Nessus
- Basic usage of Metasploit
- Understanding Buffer Overflows
- Basics of Web App Pentesting
- XSS and SQL Injection
- Burp Suite
- Prepares for the Penetration Testing Professiona Course
- After obtaining the eJPT certification qualifies you for 10 CPE
- 4 hours of HQ video training material
- 1500+ slides
- Labs in Hera Lab
- Self-paced / HTML5, PDF, MP4
- Off-line access available
- Access from PC, Tablet and Smartphone
Section: Preliminary Skills – Prerequisites
- Module 1 : Introduction
The student will be initially introduced to the information security field. They will then move on studying how cryptography and virtual private networks work. This provides them the required background to connect to Hera Lab for the first time and carry out their first hands-on lab. A binary arithmetic chapter closes the module.
- Module 2 : Networking
Computer networks are what make the Internet work, moreover they are a fundamental asset for nearly every business. Understanding networking protocols means being able to spot misconfigurations and vulnerabilities. Moreover a penetration tester with strong networking fundamentals can properly configure tools and scanners to obtain best results.
- Module 3 : Web Applications
Web Applications are more complex and pervasive than what many think. This module explains the protocols and technologies behind web applications and prepares the students for web application penetration testing topics. Moreover, students will learn how to study a web application and use the information collected to mount attacks.
- Module 4 : Penetration Testing
During this module we will answer fundamental questions like: Who are penetration testers? How do they perform their tasks? What methodology do they follow? Skills and methodology are what differentiate a real professional from an amateur. This chapter explains what methodology to use during an engagement, from the initial engaging phase to the final reporting and consultancy phase.
Section: Preliminary Skills – Programming
- Module 1 : C++
This module explains the basics of C++.
- Module 2 : Python
This module explains the basics of Python. Moreover, students will learn how to write simple custom pentesting tools.
Section: Penetration Testing
- Module 1 : Information Gathering
Information gathering is the most important phase of the overall pentesting engagement. A Penetration tester will use the information collected during this phase to map the attack surface and increase his chances to breach the organization in the same way criminals do. Students will see how to use different sources to perform information gathering phases.
- Module 2 : Footprinting & Scanning
This module covers infrastructural information gathering. Remotely identifying operating systems, server applications and clients is of paramount importance to widen the attack surface and prepare the penetration tester for the vulnerability assessment activity and the following exploitation phase.
- Module 3 : Vulnerability Assessment
Vulnerability Assessment is the process through which a penetration tester uncovers all the vulnerabilities in a computer system or application. This module explains how vulnerability assessment can be carried out by means of automatic tools or manual investigation.
- Module 4 : Web Attacks
This module dissects and explains the most widespread web application vulnerabilities. Students will study the most common web application attacks, starting from the information gathering phase to the exploitation phase. Students will learn how to perform attacks manually and then how to automate them by means of the most used tools.
- Module 5 : System Attacks
From malware, through password cracking attacks, up to buffer overflows, students will learn the most common attack vectors used against computer systems nowadays. They will learn which malware they could use during an engagement. The Password Attacks chapter explains how to recover passwords from a compromised machine. Finally, an entire chapter will be dedicated to buffer overflows, one of the most used attack vectors against applications and operating systems.
- Module 6 : Network Attacks
This module provides a comprehensive explanation of the most common and historical remote attacks. Students will learn attack techniques against authentication services, Windows file sharing and network devices. Every attack technique can be tested in a hands-on lab. The last two chapters explain in theory and in practice, how to use Metasploit and Meterpreter to automate attacks and penetration testing techniques.
- Basics of computing and computer science
- Basics of Computer Security topics although not mandatory
This training course is for…
- IT personnel / students
- IT Security passionates
- Junior Pentesters
The most sophisticated virtual lab on Penetration Testing is now made available to all the students of the Student v3 training course.
Labs scenarios have been specifically created for this training course.
The student will connect in VPN to the remote virtual lab network where vulnerable workstations/servers will be made available for test.
|Lab 1||HTTP(S) Traffic Sniffing||Preliminary Skills|
|Lab 2||Find the secret server||Preliminary Skills|
|Lab 3||Burp Suite||Preliminary Skills|
|Lab 4||Scanning and OS fingerprinting||Penetration Testing|
|Lab 5||Nessus||Penetration Testing|
|Lab 6||Dirbuster||Penetration Testing|
|Lab 7||Cross site scripting||Penetration Testing|
|Lab 8||SQL Injection||Penetration Testing|
|Lab 9||Bruteforce and Password Cracking||Penetration Testing|
|Lab 10||Null Sessions||Penetration Testing|
|Lab 11||ARP Poisoning||Penetration Testing|
|Lab 12||Metasploit||Penetration Testing|