Get eLearnSecurity PTSv3 Training Free!

| March 12, 2015 | 7 Comments

eLearnSecurity PTSv3 eJPT Certification LogoeLearnSecurity has long been a trusted training provider with multiple courses on offer. They recently updated their Penetration Testing – Student (PTS) course. The eLearnSecurity PTSv3 course is tailored for beginners. In addition to a brand new version, they also made available a new pricing structure that includes an Elite Edition, a Standard Edition and a free Bare Bones Edition. The Bare Bones Edition includes lifetime access to the training materials as well as email tech support. For a full rundown of the difference between the editions, click here.

Unfortunately, this is available only to those with an invitation. Luckily, we scored 100 seats in the invite-only free version of the eLearnSecurity PTSv3 Course. And this time there are no gimmicks, no contests, no requirements. It is simply a first come, first served deal for EH-Netters. Read on for the code that gives you access as well as some more details on the new pentesting course. This is for a limited time, so HURRY!!

To redeem your seat, all you simply have to do is go to eLearnSecurity’s Site and punch in the following code to get your reward:

IHR-ULK

If you want to upgrade to a higher version or take any of their other more advanced courses, please remember that readers of EH-Net get 5% OFF Any eLearnSecurity Course in Any Format with Coupon Code: EH-Net-5-eLS such as:

Happy hacking and remember to let us know what you think of the course in the forum thread associated with this post. Below you’ll find a little more info on the eLearnSecurity PTSv3 course. This and more can be found on their site as well.

Don
Editor-in-Chief
The Ethical Hacker Network Online Magazine

 


 

eLearnSecurity PTSv3 Course at a Glance

  • For absolute beginners in IT Security
  • Minimal pre-requisites
  • Provides Networking skills
  • Routing, Forwarding, TCP/IP
  • Analyse traffic with Wireshark
  • Provides Development skills
  • Write your first C program
  • Write your first Python script
  • Provides Penetration testing skills
  • Information gathering
  • Basic usage of nmap and Nessus
  • Basic usage of Metasploit
  • Understanding Buffer Overflows
  • Basics of Web App Pentesting
  • XSS and SQL Injection
  • Burp Suite
  • Prepares for the Penetration Testing Professiona Course

eLearnSecurity PTSv3 Syllabus

Section: Preliminary Skills – Prerequisites

  • Module 1 : Introduction

    The student will be initially introduced to the information security field. They will then move on studying how cryptography and virtual private networks work. This provides them the required background to connect to Hera Lab for the first time and carry out their first hands-on lab. A binary arithmetic chapter closes the module.

  • Module 2 : Networking

    Computer networks are what make the Internet work, moreover they are a fundamental asset for nearly every business. Understanding networking protocols means being able to spot misconfigurations and vulnerabilities. Moreover a penetration tester with strong networking fundamentals can properly configure tools and scanners to obtain best results.

  • Module 3 : Web Applications

    Web Applications are more complex and pervasive than what many think. This module explains the protocols and technologies behind web applications and prepares the students for web application penetration testing topics. Moreover, students will learn how to study a web application and use the information collected to mount attacks.

  • Module 4 : Penetration Testing

    During this module we will answer fundamental questions like: Who are penetration testers? How do they perform their tasks? What methodology do they follow? Skills and methodology are what differentiate a real professional from an amateur. This chapter explains what methodology to use during an engagement, from the initial engaging phase to the final reporting and consultancy phase.

Section: Preliminary Skills – Programming

  • Module 1 : C++

    This module explains the basics of C++.

  • Module 2 : Python

    This module explains the basics of Python. Moreover, students will learn how to write simple custom pentesting tools.

Section: Penetration Testing

  • Module 1 : Information Gathering

    Information gathering is the most important phase of the overall pentesting engagement. A Penetration tester will use the information collected during this phase to map the attack surface and increase his chances to breach the organization in the same way criminals do. Students will see how to use different sources to perform information gathering phases.

  • Module 2 : Footprinting & Scanning

    This module covers infrastructural information gathering. Remotely identifying operating systems, server applications and clients is of paramount importance to widen the attack surface and prepare the penetration tester for the vulnerability assessment activity and the following exploitation phase.

  • Module 3 : Vulnerability Assessment

    Vulnerability Assessment is the process through which a penetration tester uncovers all the vulnerabilities in a computer system or application. This module explains how vulnerability assessment can be carried out by means of automatic tools or manual investigation.

  • Module 4 : Web Attacks

    This module dissects and explains the most widespread web application vulnerabilities. Students will study the most common web application attacks, starting from the information gathering phase to the exploitation phase. Students will learn how to perform attacks manually and then how to automate them by means of the most used tools.

  • Module 5 : System Attacks

    From malware, through password cracking attacks, up to buffer overflows, students will learn the most common attack vectors used against computer systems nowadays. They will learn which malware they could use during an engagement. The Password Attacks chapter explains how to recover passwords from a compromised machine. Finally, an entire chapter will be dedicated to buffer overflows, one of the most used attack vectors against applications and operating systems.

  • Module 6 : Network Attacks

    This module provides a comprehensive explanation of the most common and historical remote attacks. Students will learn attack techniques against authentication services, Windows file sharing and network devices. Every attack technique can be tested in a hands-on lab. The last two chapters explain in theory and in practice, how to use Metasploit and Meterpreter to automate attacks and penetration testing techniques.

Don’t Forget to Get the eJPT Certification

The eJPT designation stands for eLearnSecurity Junior Penetration Tester. eJPT is a 100% practical certification on penetration testing and information security essentials. By passing the challenging exam and obtaining the eJPT certificate, a penetration tester can prove their skills in the fastest growing area of information security

Once again, here is eLearnSecurity’s full course list.

Tags: , ,

Category: Special Events

Comments (7)

Trackback URL | Comments RSS Feed

  1. UNIX says:

    Thanks Don, seems to be a nice opportunity for complete beginners.

  2. Avatar image don says:

    @UNIX – Quite welcome. In deals like this where it’s free, I don’t make any money. It’s all about giving back. Hopefully it will continue to drive eyes to the site, and we can keep on passing the torch.

    Only 50 of the 100 seats left! Help spread the word by RTing the announcement @ethicalhacker.

    Thanks,
    Don

  3. Avatar image don says:

    Enjoy. Let us know what you think. Be sure to come back and contribute to our forums on any number of topics.

    Don

  4. Avatar image don says:

    And then there were 5!

    Not many invites left. Better hurry.

    Don

  5. Avatar image don says:

    And then there were none. Thanks for playing!

    Good luck to those who were able to nab one.

    Happy hacking,
    Don

  6. Daniel says:

    Thanks for the reminder, I managed to pick up one of these invites through another source and am just now getting into the material. It’s amazing how much decent free training there is out there today.

Leave a Reply