Red Team - Junior Penetration Tester

The "Junior Penetration Tester" learning path is designed to equip aspiring cybersecurity professionals with foundational and advanced skills required for penetration testing. The curriculum focuses on various topics, including networking, cryptography, vulnerability assessment, and exploitation techniques for Linux, Windows, and Active Directory environments. Students will also learn reporting practices, preparing them for real-world penetration testing scenarios.

17 Modules
61 Lessons
1 Labs
4 Downloadable files
170 Questions

Junior Penetration Tester

Intro
Network Devices and Protocols
Important Application Layer Protocols
Understanding OSI & TCP/IP models
Introduction to Networking
Cryptanalysis and Cryptographic Attacks
Cryptographic Protocols and Applications
Symmetric and Asymmetric Key Cryptography
Introduction to Cryptography
Introduction to Information Gathering
Active Reconnaissance
Passive Reconnaissance
NMAP NSE
Introduction to Network Mapping
Advanced Scan Techniques
Host Discovery
Port Scanning
Common Vulnerabilities and Public Exploits
Hands-on Practice
Understanding different password attack methods
Shells and Reverse Shells
Metasploit Framework
Introduction to Web Applications
Client-Server Architecture Essentials
Authentication and Authorization Mechanisms
Web Application Testing with Burp Suite
Introduction to Burp Suite
Configuration and Navigation
Insecure direct object references (IDOR)
File Inclusion
Business Logic Flaws
Cross-site Scripting (XSS)
Command Injection
Broken Access Control
Server-Side Request Forgery
OWASP TOP 10 Introduction
SQL Injection
Service and Process Management in Linux
What is Linux?
User and Group Management
Linux File System Structure
Linux Command Line Interface (CLI)
Linux Host Reconnaissance
Linux Privilege Escalation
Linux Persistence Techniques
Session and Credentials Management
Processes, Services and Scheduled Tasks
Windows GUI - Main Components
Windows PowerShell
Windows Registry
Windows Host Reconnaissance
Windows Persistence
Windows Privilege Escalation Techniques
Introduction to Active Directory
Authentication in Active Directory
Lesson Quiz
Post-Compromise Attacks
Initial Attack Vectors
Domain Enumeration
Lateral Movement on Domain
Domain Persistence
Documentation and Reporting