Call 1-800-305-3855 for more information on available plans and pricing

Study at your own pace

PTS comes with life-time access to course material and flexible access to the world’s best virtual labs on Penetration Testing : Hera Lab

Practice oriented

PTS provides a number of exercises in the most sophisticated virtual lab on Penetration testing: Hera Lab.

Tailored for Beginners

PTS starts from the very basics and covers Networking and Programming skills every Penetration tester should have

Course at a Glance
  • For absolute beginners in IT Security
  • Minimal pre-requisites
  • Provides Networking skills
  • Routing, Forwarding, TCP/IP
  • Analyse traffic with Wireshark
  • Provides Development skills
  • Write your first C program
  • Write your first Python script
  • Provides Penetration testing skills
  • Information gathering
  • Basic usage of nmap and Nessus
  • Basic usage of Metasploit
  • Understanding Buffer Overflows
  • Basics of Web App Pentesting
  • XSS and SQL Injection
  • Burp Suite
  • Prepares for the Penetration Testing Professiona Course
  • After obtaining the eJPT certification qualifies you for 10 CPE
Course material
  •     4 hours of HQ video training material
  •     1500+ slides
  •     Labs in Hera Lab
Course delivery
  •     Self-paced / HTML5, PDF, MP4
  •     Off-line access available
  •     Access from PC, Tablet and Smartphone
Section: Preliminary Skills – Prerequisites
  • Module 1 : Introduction

    The student will be initially introduced to the information security field. They will then move on studying how cryptography and virtual private networks work. This provides them the required background to connect to Hera Lab for the first time and carry out their first hands-on lab. A binary arithmetic chapter closes the module.

  • Module 2 : Networking

    Computer networks are what make the Internet work, moreover they are a fundamental asset for nearly every business. Understanding networking protocols means being able to spot misconfigurations and vulnerabilities. Moreover a penetration tester with strong networking fundamentals can properly configure tools and scanners to obtain best results.

  • Module 3 : Web Applications

    Web Applications are more complex and pervasive than what many think. This module explains the protocols and technologies behind web applications and prepares the students for web application penetration testing topics. Moreover, students will learn how to study a web application and use the information collected to mount attacks.

  • Module 4 : Penetration Testing

    During this module we will answer fundamental questions like: Who are penetration testers? How do they perform their tasks? What methodology do they follow? Skills and methodology are what differentiate a real professional from an amateur. This chapter explains what methodology to use during an engagement, from the initial engaging phase to the final reporting and consultancy phase.

Section: Preliminary Skills – Programming
  • Module 1 : C++

    This module explains the basics of C++.

  • Module 2 : Python

    This module explains the basics of Python. Moreover, students will learn how to write simple custom pentesting tools.

Section: Penetration Testing
  • Module 1 : Information Gathering

    Information gathering is the most important phase of the overall pentesting engagement. A Penetration tester will use the information collected during this phase to map the attack surface and increase his chances to breach the organization in the same way criminals do. Students will see how to use different sources to perform information gathering phases.

  • Module 2 : Footprinting & Scanning

    This module covers infrastructural information gathering. Remotely identifying operating systems, server applications and clients is of paramount importance to widen the attack surface and prepare the penetration tester for the vulnerability assessment activity and the following exploitation phase.

  • Module 3 : Vulnerability Assessment

    Vulnerability Assessment is the process through which a penetration tester uncovers all the vulnerabilities in a computer system or application. This module explains how vulnerability assessment can be carried out by means of automatic tools or manual investigation.

  • Module 4 : Web Attacks

    This module dissects and explains the most widespread web application vulnerabilities. Students will study the most common web application attacks, starting from the information gathering phase to the exploitation phase. Students will learn how to perform attacks manually and then how to automate them by means of the most used tools.

  • Module 5 : System Attacks

    From malware, through password cracking attacks, up to buffer overflows, students will learn the most common attack vectors used against computer systems nowadays. They will learn which malware they could use during an engagement. The Password Attacks chapter explains how to recover passwords from a compromised machine. Finally, an entire chapter will be dedicated to buffer overflows, one of the most used attack vectors against applications and operating systems.

  • Module 6 : Network Attacks

    This module provides a comprehensive explanation of the most common and historical remote attacks. Students will learn attack techniques against authentication services, Windows file sharing and network devices. Every attack technique can be tested in a hands-on lab. The last two chapters explain in theory and in practice, how to use Metasploit and Meterpreter to automate attacks and penetration testing techniques.

  • Basics of computing and computer science
  • Basics of Computer Security topics although not mandatory
This training course is for…
  • IT personnel / students
  • IT Security passionates
  • Junior Pentesters

The most sophisticated virtual lab on Penetration Testing is now made available to all the students of the Student v3 training course.

Labs scenarios have been specifically created for this training course.

The student will connect in VPN to the remote virtual lab network where vulnerable workstations/servers will be made available for test.

Lab IDDescriptionCategory
Lab 1HTTP(S) Traffic SniffingPreliminary Skills
Lab 2Find the secret serverPreliminary Skills
Lab 3Burp SuitePreliminary Skills
Lab 4Scanning and OS fingerprintingPenetration Testing
Lab 5NessusPenetration Testing
Lab 6DirbusterPenetration Testing
Lab 7Cross site scriptingPenetration Testing
Lab 8SQL InjectionPenetration Testing
Lab 9Bruteforce and Password CrackingPenetration Testing
Lab 10Null SessionsPenetration Testing
Lab 11ARP PoisoningPenetration Testing
Lab 12MetasploitPenetration Testing

Call 1-800-305-3855 for more information on available plans and pricing