Ir al contenido principal

eJPTv2 Review and Tips

 ¿What is eJPTv2?

Desktop View


eJPTv2 is an ideal certification for all those who want to start as a pentester, stressing that it is a Junior certification, therefore it is unlikely to obtain any type of job only with said certification.

You can get more information about eJPTv2 on their website(https://ine.com/learning/certifications/internal/elearnsecurity-junior-penetration-tester-v2).


Information about the evaluation system Previously the evaluation criteria was based on passing 5 marks, including the final mark and 4 sections, on January 10, 2023 eLearnSecurity decided to change the evaluation criteria to the same one used in the previous version of eJPT(v1). To pass the exam and obtain your certification you must equal or exceed the minimum final grade (70%) The exam lasts a maximum of 48 hours. eJPTv2 preparation course The preparation course have a total of 143 hours and is divided into the following sections: -Assessment Methodologies -Host & Networking Auditing -Host & Network Penetration Testing -Web Application Penetration Testing
 
 My experience with eJPTv2

In my case, I took the exam with 9% of the course taken.
I started the exam on a Thursday at 6:00 p.m. and finished it on a Friday at 8:00 p.m., stressing that I rested, went to the gym..., therefore it means that in 48 hours you have plenty of time to take the exam .

The exam is easy for everyone who has a minimum of experience, it wasn't complicated at all for me, what's more, I was the one who got complicated trying to carry out more complex attacks.
Tips for the exam

Know how to use metasploit, in the exam you do not have access to the internet, therefore you will be forced to use it.

Understand and know how to use the following tools:

-nmap

-hydra

-wfuzz

If you get stuck in the exam I recommend you take a break, as I said before, you have plenty of time to take the exam.

Take notes of all services and information you obtain, it may be useful at some point in the exam. 
 
My certificate 
 

Comentarios

Entradas populares de este blog

MONTAJE MODDING

 En el mundo de la informática, un MODDING PC es el proceso de alterar el hardware y el software de un ordenador para darle un aspecto y un funcionamiento únicos. El interior y exterior del dispositivo sufrirán alternación es estéticas sin afectar necesariamente a los ajustes de software. Es más, es posible que en ocasiones los atributos de un equipo puedan mejorarse mediante ajustes y personalizaciones. El abanico de modificaciones opciones en un MODDING es muy amplio. Ya sea para el diseño o estética, el mayor beneficio del MODDING de PC es la oportunidad de contar tu propia historia, manteniendo la funcionalidad y el rendimiento. Nos podemos encontrar con 2 tipos de modificaciones del PC: internas o externas, o ambas. La modificacion del software, que incluye el overclocking, el ajuste de la BIOS, de la RAM y almacenamiento interno  Hay una amplia gama de herramientas especializadas para tener en cuenta a la hora de diseñar un MODDING como por ejemplo: Instrumentos de corte  Pintura

The wiring day (Raul Garcia)

This wednesday we had an special class. Instead of having or usual AWS lections, we had to make lots of Ethernet cables, wich, might sound boring, but sure it wasnt. We started slow, there was more than 2 hours left, and the recess was just around the corner, we only had to make 28 wires, which had to be more than 5 meters long. Only a few cables were made when the recess started, when we came back we kept going with our chore Every single wire had to be made with caution, just a small mistake and all the process had to be started again, which made the work quite stressful. Luckly I didnt make any mistake, and managed to make 4 cables. The last hour of the work was the worst, only then was when we realiced how many of them were missing, so all of us, tired and stressed started to make as many as possible to reach the goal. At the end all of the class managed to make 25 in total, which wasnt 28, but close enough to be ok. At least for me it was a really fun experience, and we will have

Understanding Nmap: A Powerful Network Exploration Tool in Kali Linux

- What is Nmap and how does it works? Nmap is a network exploration tool, and explains its basic functionality. Nmap uses various network protocols to scan and identify hosts and services on a network. - Understanding Nmap's different scan types and their purposes There are many different types of scans in Nmap, such as TCP, UDP, SYN, and others. - Tips for optimizing Nmap scans and avoiding detection You can optimize their Nmap scans for better results, such as adjusting timing options and using scan flags. Additionally, strategies to avoid detection by firewalls and intrusion detection systems (IDS) are covered. - Real-world examples of how Nmap can be used in network exploration and security assessments Nmap can be used in network exploration and security assessments - Nmap can be used in practical scenarios, such as identifying vulnerable systems, detecting open ports, and assessing network security. Nmap can be integrated with other tools, such as Metasploit and Ne