👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • eJPTv2 Exam Overview
  • Who Should Take the eJPTv2 Exam?
  • Topics Covered in the eJPTv2 Exam
  • Exam Format
  • Conclusion
  • Notes Objectives
  • Topics Covered

Was this helpful?

  1. Exam Prep Notes

Junior Penetration Tester (eJPTv2) - Notes

eJPTv2 Exam Overview

The eLearnSecurity Junior Penetration Tester (eJPTv2) certification is an entry-level certification designed for individuals looking to start a career in penetration testing and cybersecurity. This certification validates fundamental skills and knowledge required for a junior penetration tester role, focusing on practical and hands-on skills that are essential in the cybersecurity field.

Who Should Take the eJPTv2 Exam?

The eJPTv2 exam is an excellent choice for:

  • Beginners in Cybersecurity: Individuals who are new to cybersecurity and want to gain a strong foundation in penetration testing.

  • IT Professionals: IT professionals looking to transition into a cybersecurity role or enhance their current skill set.

  • Students and Recent Graduates: Students and recent graduates in IT or computer science fields who want to kickstart their career in cybersecurity.

  • Security Enthusiasts: Individuals passionate about cybersecurity and looking to validate their self-taught skills.

Topics Covered in the eJPTv2 Exam

The eJPTv2 exam covers a broad range of topics essential for junior penetration testers. The primary areas of focus include:

  1. Networking Basics: Understanding of TCP/IP, OSI model, subnetting, and common networking protocols.

  2. Information Gathering: Techniques for gathering information about targets, including passive and active reconnaissance methods.

  3. Scanning and Enumeration: Methods for discovering and enumerating network hosts, services, and vulnerabilities.

  4. Vulnerability Assessment: Identifying and assessing vulnerabilities in various systems and applications.

  5. Exploitation Basics: Fundamental concepts and techniques for exploiting vulnerabilities to gain unauthorized access.

  6. Web Application Security: Understanding of common web application vulnerabilities such as SQL injection, XSS, and CSRF.

  7. System Security: Basics of operating system security for Windows and Linux, including user management, permissions, and common vulnerabilities.

  8. Social Engineering: Techniques for manipulating individuals to gain unauthorized access or information.

  9. Report Writing: Skills for documenting findings and providing actionable recommendations in a professional manner.

Exam Format

The eJPTv2 exam is practical and hands-on, requiring candidates to demonstrate their skills in a simulated environment. The exam typically involves:

  • Practical Labs: Hands-on tasks that test the candidate's ability to apply theoretical knowledge to real-world scenarios.

  • Multiple Choice Questions: Assessing the candidate’s understanding of core concepts and methodologies.

Conclusion

The eJPTv2 exam is a valuable certification for anyone looking to start a career in penetration testing and cybersecurity. It provides a solid foundation in essential skills and knowledge, making it an ideal choice for beginners and those transitioning into cybersecurity roles. By covering a comprehensive range of topics and offering a practical exam format, the eJPTv2 ensures that candidates are well-prepared for real-world challenges in the cybersecurity field.


Notes Objectives

These notes are based on the course content provided by INE or eLearnSecurity for preparation towards the Junior Penetration Tester (eJPTv2) exam. The course includes both theoretical and practical learning materials. While these notes can help you pass the eJPTv2 exam, it's strongly recommended that you complete the full course provided by INE or eLearnSecurity. This will give you a comprehensive understanding and hands-on experience with new tools, techniques, testing methodologies, and help you develop a robust mindset for penetration testing. These notes are compiled based on my understanding and may not cover all exam content comprehensively.

Topics Covered




Hacker's Mantra:When solving problems, dig at the roots instead of just hacking at the leaves. - Anthony J. D'Angelo

PreviousOther PDF ReferencesNextAssessment Methodologies

Last updated 10 months ago

Was this helpful?

📚
📑
Assessment Methodologies
Assessment Methodologies: Auditing Fundamentals
Host & Network Penetration Testing
Web Application Penetration Testing