Focus
Focus areas
- Step 1
Assessment methodologies plus reconnaissance, footprinting, and scanning workflows that mirror the eJPT objectives.
- Step 2
Host and network auditing designed for Windows/Linux enterprise estates along with enumeration, auditing, and vulnerability validation.
- Step 3
Host & network penetration testing (pivoting, exploitation, privilege escalation) paired with web application testing (OWASP/hidden directories) so the entry-level red team path stays holistic.