top of page

Junior Penetration Tester

Duration

105 Hours

Category

Offensive Security Career Path

About the Course

Embark on a transformative journey towards becoming a proficient Junior Penetration Tester through our comprehensive Jr Penetration Tester


Career Path designed for students and professionals with a passion for ethical hacking and a desire to safeguard digital landscapes, this program provides hands-on, self-paced and experiential labs that will equip you with the skills needed to excel in this dynamic field.


Role Requirements


1. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, nonrepudiation).


2. Ability to apply and adhere to industry standard penetration testing methodologies and standards during the planning and execution of engagements/assessments (OSSTMM, PTES, OWASP Security Testing Guide, OWASP Top 10 etc.)


3. Ability to perform target intelligence gathering (e.g., OSINT).


4. Ability to use network analysis tools to perform network mapping, port scanning, enumeration, and traffic analysis (Nmap, Wireshark, TCPDump etc.)


5. Ability to conduct vulnerability scans and recognize vulnerabilities in security systems


6. Ability to identify, categorize and exploit vulnerabilities in operating systems and applications (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)


7. Ability to perform brute-force password attacks against common protocols and services (SSH, FTP, SMB, RDP, WinRM etc.)


8. Ability to perform hash cracking techniques against common OS specific password hashes (e.g. Hashcat, John the Ripper etc.)


9. Ability to utilize exploitation frameworks for reconnaissance, enumeration, initial access, privilege escalation and persistence (e.g. Metasploit Framework)


10. Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.

bottom of page