CYS TECH
CYS TECH
Call: +964 750 123 4567
Email: info@cystech1.com
CYS TECH
  • Home
  • Services
  • About
  • Courses
  • Teachers
  • Contact
  • Exams
  • CTF
Join Now
Home About Courses Teachers Contact Exams CTF Login Register My Account Logout
Join Now
Home About Courses Teachers Contact Exams CTF Login Register My Account Logout

Learn CTF

Master cybersecurity through hands-on Capture The Flag challenges. Learn penetration testing, vulnerability assessment, and ethical hacking.

Penetration Testing Digital Forensics Cryptography
Start Learning

Courses

Comprehensive cybersecurity courses designed by industry experts. From beginner to advanced levels, master the skills you need.

Certified Programs Video Lectures Practical Labs
Browse Courses

Exams

Test your cybersecurity knowledge with our comprehensive exam system. Get certified and validate your skills.

Certifications Timed Tests Progress Tracking
Take Exam

Teachers

Learn from industry-leading cybersecurity experts and professionals with years of real-world experience.

Expert Instructors Industry Experience Mentorship
Meet Teachers

About

Discover our mission to advance cybersecurity education and create the next generation of security professionals.

Our Mission Our Story Achievements
Learn More

Contact

Get in touch with our team for inquiries, support, or collaboration opportunities. We're here to help you succeed.

24/7 Support Global Reach Quick Response
Contact Us

Home

Welcome to CYS TECH - your gateway to comprehensive cybersecurity education and professional development.

Get Started Explore Discover
Go Home

Junior Penetration Tester (eJPTv2)

التصنيفات : الامن السيبراني
قائمتي المفضلة مشاركة
مشاركة
رابط الصفحة
مشاركة على وسائل التواصل الاجتماعي
  • معلومات الدورة
  • التقييمات
  • المزيد
    • ماذا سوف تتعلم؟

      • تعلم اختبار الاختراق من الصفر للوصول الى الاحتراف والتقدم للشهاده العالميه eJPTv2

      محتوى الدورة

      introduction to course

      • introduction pen testing
        31:26
      • VPN
        17:29
      • Network part 1
        44:00
      • Network part 2
        28:44
      • Network part 3
        24:11
      • Network part 4
        37:24
      • Network part 5
        39:02
      • Network part 6
        37:30
      • Network part 7
        16:04
      • wireshark part 1
        39:42
      • wireshark part 2(extra)
        24:53
      • wireshark part3 (extra)
        28:46
      • Wep application part 1
        32:24
      • web application part 2
        25:55
      • web application part 3
        15:30

      Basic kali linux (old)

      • kali download
        11:21
      • command kali part 1
        19:14
      • command kali part 2
        35:40
      • command kali part 3
        35:14
      • abbreviations in Kali Linux
        14:26

      Assessment methodologies

      • information gathering part 1
        21:42
      • information gathering part 2
        32:03
      • information gathering part 3
        30:38
      • information gathering part 4
        16:21
      • information gathering part 5
        34:55
      • information gathering part 6
        44:44
      • information gathering part 7
        53:48
      • footprinting & scanning part 1
        28:22
      • footprinting & scanning part 2
        47:33
      • footprinting & scanning part 3
        35:06
      • footprinting & scanning part 4
        36:21
      • footprinting & scanning part 5 (vulnversity lab 1)
        15:35
      • footprinting & scanning part 6 (Passive Recon lab2)
        19:52
      • footprinting & scanning part 7 (Active Recon lab3)
        18:25
      • footprinting & scanning part 8 (lab 4 Blue SMB )
        47:53
      • footprinting & scanning part 9 ( lab 5)
        07:08
      • Enumeration part 1
        54:54
      • Enumeration part 2 (FTP brute force attack)
        28:31
      • Enumeration part3 (lab 2 login SSH)
        21:22
      • Enumeration part 4 (lab 3 Enumeration apache)
        43:36
      • Enumeration part 5 (lab 4 samba recon )
        18:04
      • Enumeration part 6 (lab5 Mysql Recon)
        38:00
      • Enumeration part 7 (lab 6 Enumeration Telnet )
        23:37
      • Enumeration part 8 (lab 7 Enumeration SMTP)
        28:20
      • Vulnerability assessment part 1
        31:24
      • Vulnerability assessment part 2
        17:22
      • Vulnerability assessment part 3 (lab 1 nessus)
        34:59
      • Vulnerability assessment part 4 (lab 2 webdav)
        29:59
      • Vulnerability assessment part 5 (lab3 shellshock)
        35:20

      Network Auditing

      • auditing fundamentals
        26:19

      Host&Network penetration testing

      • system and host based attack part 1
        30:05
      • system and host based attack part 2 (webdav part 1)
        29:59
      • system and host based attack part3(webdav part2 )
        26:56
      • system and host based attack part4 SMB
        22:01
      • system and host based attack part 5(lab3 psexec)
        53:27
      • system and host based attack part6(lab 4 SMB)
        39:02
      • system and host based attack part 7 (RDP)
        11:46
      • system and host based attack part 8 (lab 5 RDP)
        18:18
      • system and host based attack part 9
        09:04
      • system and host based attack part 10 (lab 6 WinRM)
        32:20
      • system and host based attack part 11
        13:18
      • system and host based attack part 12 (UAC)
        15:39
      • system and host based attack part 13(lab 7 UAC)
        34:27
      • system and host based attack part 14
        13:32
      • system and host based attack part 15 (lab8 Token)
        13:18
      • system and host based attack part 16
        27:53
      • system and host based attack part 17(lab9 Unatted)
        16:21
      • system and host based attack part 18 (lab10 kiwi)
        13:22
      • system and host based attack part 19
        24:08
      • system and host based attack part 20 (lab 11shellshoke)
        35:20
      • system and host based attack part 21
        08:56
      • system and host based attack part 22 (lab 12 FTP)
        28:31
      • system and host based attack part 23 (lab SSH)
        21:22
      • system and host based attack part 24(lab 14 samba)
        18:04
      • system and host based attack part 25
        17:14
      • system and host based attack part 26 (lab 15 cron)
        19:10
      • system and host based attack part 27 (lab 16 SUID)
        24:52
      • system and host based attack part 28 (lab 17 SUID)
        36:06
      • Network based attack part 1
        24:12
      • Network based attack part 2 (lab 1 NetBios)
        17:14
      • Network based attack part 3
        14:52
      • Network based attack part 4 (lab 2 SNMP)
        37:02
      • Network based attack part 5
        12:59
      • Metasploit framework part 1
        26:29
      • Metasploit framework part 2
        28:25
      • Metasploit framework part 3
        11:31
      • Metasploit framework part 4 (lab 1)
        20:00
      • Metasploit framework Part 5
        16:05
      • Metasploit framework part 6 (lab 2 FTP)
        21:05
      • Metasploit framework Part 7 (lab 3 SMB)
        28:26
      • Metasploit framework part 8 (lab 4 Web Server)
        43:52
      • Metasploit framework part 9 (lab 5 MySQL)
        31:19
      • Metasploit framework part 10 (lab 6 SSH)
        20:17
      • Metasploit framework part 11 (lab 6 SMTP)
        28:20
      • Metasploit framework part 12
        12:42
      • metasploitable3 download
        05:49

      تقييمات ومراجعات الطلاب

      لا يوجد تقييم حتى الآن
      لا يوجد تقييم حتى الآن
      70,00 $
      • متوسط
      • 34 إجمالي الملتحقين
      • 90 ساعات المدة
      • نوفمبر 5, 2025 آخر تحديث
      • Certificate of completion
      أهلاً بك مرة أخرى!
      نسيت كلمة السر؟
      ليس لديك حساب؟  سجّل الآن

      دورة بواسطة

      M
      Mo'tasem

      الجمهور

      • محبين مجال اختبار الاختراق والمبتدئين في المجال

      Cys Tech

      • الصفحة الرئيسية
      • لغات البرمجة
      • امن سيبراني
      • الشبكات
      • انظمة التشغيل
      • مواد جامعية
      • My account
      • الصفحة الرئيسية
      • لغات البرمجة
      • امن سيبراني
      • الشبكات
      • انظمة التشغيل
      • مواد جامعية
      • My account
      تسجيل الدخول