eLearnSecurity has long been a trusted training provider with multiple courses on offer. They recently updated their Penetration Testing – Student (PTS) course. The eLearnSecurity PTSv3 course is tailored for beginners. In addition to a brand new version, they also made available a new pricing structure that includes an Elite Edition, a Standard Edition and a free Bare Bones Edition. The Bare Bones Edition includes lifetime access to the training materials as well as email tech support. For a full rundown of the difference between the editions, click here.
Unfortunately, this is available only to those with an invitation. Luckily, we scored 100 seats in the invite-only free version of the eLearnSecurity PTSv3 Course. And this time there are no gimmicks, no contests, no requirements. It is simply a first come, first served deal for EH-Netters. Read on for the code that gives you access as well as some more details on the new pentesting course. This is for a limited time, so HURRY!!
To redeem your seat, all you simply have to do is go to eLearnSecurity’s Site and punch in the following code to get your reward:
If you want to upgrade to a higher version or take any of their other more advanced courses, please remember that readers of EH-Net get 5% OFF Any eLearnSecurity Course in Any Format with Coupon Code: EH-Net-5-eLS such as:
- Penetration Testing Professional
- Mobile Application Security and Penetration Testing
- Web Application Penetration Testing
- Web Application Penetration Testing eXtreme
- Practical Web Defense
- Practical Network Defense
- Advanced Reverse Engineering of Software
Happy hacking and remember to let us know what you think of the course in the forum thread associated with this post. Below you’ll find a little more info on the eLearnSecurity PTSv3 course. This and more can be found on their site as well.
The Ethical Hacker Network Online Magazine
eLearnSecurity PTSv3 Course at a Glance
- For absolute beginners in IT Security
- Minimal pre-requisites
- Provides Networking skills
- Routing, Forwarding, TCP/IP
- Analyse traffic with Wireshark
- Provides Development skills
- Write your first C program
- Write your first Python script
- Provides Penetration testing skills
- Information gathering
- Basic usage of nmap and Nessus
- Basic usage of Metasploit
- Understanding Buffer Overflows
- Basics of Web App Pentesting
- XSS and SQL Injection
- Burp Suite
- Prepares for the Penetration Testing Professiona Course
eLearnSecurity PTSv3 Syllabus
Section: Preliminary Skills – Prerequisites
- Module 1 : Introduction
The student will be initially introduced to the information security field. They will then move on studying how cryptography and virtual private networks work. This provides them the required background to connect to Hera Lab for the first time and carry out their first hands-on lab. A binary arithmetic chapter closes the module.
- Module 2 : Networking
Computer networks are what make the Internet work, moreover they are a fundamental asset for nearly every business. Understanding networking protocols means being able to spot misconfigurations and vulnerabilities. Moreover a penetration tester with strong networking fundamentals can properly configure tools and scanners to obtain best results.
- Module 3 : Web Applications
Web Applications are more complex and pervasive than what many think. This module explains the protocols and technologies behind web applications and prepares the students for web application penetration testing topics. Moreover, students will learn how to study a web application and use the information collected to mount attacks.
- Module 4 : Penetration Testing
During this module we will answer fundamental questions like: Who are penetration testers? How do they perform their tasks? What methodology do they follow? Skills and methodology are what differentiate a real professional from an amateur. This chapter explains what methodology to use during an engagement, from the initial engaging phase to the final reporting and consultancy phase.
Section: Preliminary Skills – Programming
- Module 1 : C++
This module explains the basics of C++.
- Module 2 : Python
This module explains the basics of Python. Moreover, students will learn how to write simple custom pentesting tools.
Section: Penetration Testing
- Module 1 : Information Gathering
Information gathering is the most important phase of the overall pentesting engagement. A Penetration tester will use the information collected during this phase to map the attack surface and increase his chances to breach the organization in the same way criminals do. Students will see how to use different sources to perform information gathering phases.
- Module 2 : Footprinting & Scanning
This module covers infrastructural information gathering. Remotely identifying operating systems, server applications and clients is of paramount importance to widen the attack surface and prepare the penetration tester for the vulnerability assessment activity and the following exploitation phase.
- Module 3 : Vulnerability Assessment
Vulnerability Assessment is the process through which a penetration tester uncovers all the vulnerabilities in a computer system or application. This module explains how vulnerability assessment can be carried out by means of automatic tools or manual investigation.
- Module 4 : Web Attacks
This module dissects and explains the most widespread web application vulnerabilities. Students will study the most common web application attacks, starting from the information gathering phase to the exploitation phase. Students will learn how to perform attacks manually and then how to automate them by means of the most used tools.
- Module 5 : System Attacks
From malware, through password cracking attacks, up to buffer overflows, students will learn the most common attack vectors used against computer systems nowadays. They will learn which malware they could use during an engagement. The Password Attacks chapter explains how to recover passwords from a compromised machine. Finally, an entire chapter will be dedicated to buffer overflows, one of the most used attack vectors against applications and operating systems.
- Module 6 : Network Attacks
This module provides a comprehensive explanation of the most common and historical remote attacks. Students will learn attack techniques against authentication services, Windows file sharing and network devices. Every attack technique can be tested in a hands-on lab. The last two chapters explain in theory and in practice, how to use Metasploit and Meterpreter to automate attacks and penetration testing techniques.
Don’t Forget to Get the eJPT Certification
The eJPT designation stands for eLearnSecurity Junior Penetration Tester. eJPT is a 100% practical certification on penetration testing and information security essentials. By passing the challenging exam and obtaining the eJPT certificate, a penetration tester can prove their skills in the fastest growing area of information security
Once again, here is eLearnSecurity’s full course list.