Passed eJPT Exam

I'm excited that I just passed the eJPT exam! The coursework and labs were some of the best I've come across so far and I definitely enjoyed learning and practicing new skills. There's probably a bit more hand holding in the training materials compared to more advanced training, but as a entry level/junior course/exam I think this is acceptable. In the end, thorough study of the coursework and labs taught me the basics of pen testing and prepared me for passing the eJPT exam.
I suspect the eJPT does not rate highly for most, but for lifelong telecom professional looking to switch to infosec I found it valuable to gain some hands-on training experience versus the high level talk found in most training and certs I've taken so far.
I also now have a greater appreciation for persistence in tackling a hard problem - getting stuck sucks, but finally overcoming a stubborn obstacle feels awesome!
I suspect the eJPT does not rate highly for most, but for lifelong telecom professional looking to switch to infosec I found it valuable to gain some hands-on training experience versus the high level talk found in most training and certs I've taken so far.
I also now have a greater appreciation for persistence in tackling a hard problem - getting stuck sucks, but finally overcoming a stubborn obstacle feels awesome!
Comments
Currently Working On: Python, OSCP Prep
Next Up: OSCP
Studying: Code Academy (Python), Bash Scripting, Virtual Hacking Lab Coursework
Not sure what's next. The eCPPT is relatively expensive and not nearly as well known as CEH or OSCP.
Thinking of spending a few months working on immersive labs, hackthebox, pentester lab, and some vulnhub boxes and then signing up for OSCP.
I saw they offer free access to students so got access that way. I knocked out the unix labs and will check out some of the more advanced ones in a bit.
Goals for 2019 : OSEE
Goals for 2020 : OSWE
2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
Twitter: https://twitter.com/Malware_Mike
Website: https://www.malwaremike.com
As in do I now open the hera labs portal from my Kali vmware? Or do I need to do that from my host system (windows) ? how can I further connect to the first lab of Traffic Sniffing?
Before starting your Lab, download and install OpenVPN Client from here:https://openvpn.net/index.php/open-source/downloads.htmlOnce the client is installed, reboot your system (you actually have to reboot to avoid laterissues).
However, how do we install this after downloading and unzipping?