Roadmap to Junior Pentester

The Chaos

Getting into penetration testing is exciting but it can also feel overwhelming. One quick search online and you’re hit with endless topics: networking, Linux, scripting, web apps, certifications, tools, exploits, and more. It’s easy to feel like you need to learn everything at once, which can be overwhelming. For many beginners, pentesting feels confusing, fragmented, and difficult to navigate.

At its core, pentesting is about understanding how complex systems work and how they can fail. Modern systems are built from many layers, and a pentester needs to understand several of them at once.

A single penetration test might involve:

  • Networks and how data moves between systems
  • Operating systems and how they manage users, processes, and permissions
  • Web applications and how browsers interact with servers
  • Databases and how data is stored and retrieved
  • Security controls and how they are designed to stop attacks

The chaos is heightened when you hear advice such as:

  • “Learn networking first”
  • “Learn Linux”
  • “Learn web security”
  • “Learn scripting”
  • “Just practice labs”

The hardest part of getting into penetration testing isn’t the technical difficulty—it’s the Chaos. There are too many topics, too many tools, too many opinions, and no obvious order to learn them in. Without structure, it’s easy to feel like you’re constantly busy but not actually progressing. All of this advice is technically correct—but without context, it feels overwhelming. Without strong foundations, learning can feel like memorizing random commands instead of developing real understanding.

This is where a roadmap becomes powerful.

A roadmap doesn’t just tell you what to learn. Over time, it helps you build your own methodology—a way of thinking and approaching problems that brings order to complexity. Following a structured roadmap builds skills step by step, ensuring that there are no knowledge gaps and brings order to the chaos.

The Roadmap

The roadmap was developed by some of the best pentesters in South Africa to cultivate practical pentesting skills with an understanding of the fundemental concepts. The roadmap aims to develop real-world pentesting skills backed by industry-leading certifications.

My photo My photo

1. Fundamentals

Building a Website

Building a website is one of the best ways to gain foundational knowledge for penetration testing, even though it doesn’t look like “security” at first.

Understanding How the Web Actually Works

When you build a website, you learn how the browser, server, and database interact with each other. This includes:

  1. A Basic Server Setup
  2. Authentication
  3. File Upload and Web Scraping
  4. Hosting the Website

1. A Basic Server Setup

The guide below shows you how to set up a NodeJS server with a MySQL Database to perform CRUD functions.

Basic Server Setup

Explore how to setup a basic server

2. Authentication

We build on the basic server by allowing multiple users to access the app through a registration page where users can create profiles. The profiles are managed through sessions implemented by the PassportJS library.

Authentication

Explore how to configure authentication

3. Functionality

The functionality is extended by allowing users to upload files and also pulling information from a different website using a web scraper.

Functionality

Extended functionality including File Upload and Web Scraping

4. Hosting the Website

Finally we will configure a Nginx Server on a Raspberry Pi to serve our site. We will also enable SSL on the Nginx server with a free dynamic domain.

Hosting

Self-Hosting the Website on a Raspberry Pi


2. eJPT

Once strong foundations are built in the web domain and there is a complete understanding of how websites work. The next step is exposure to security concepts and building a core pentesting methedology. The eJPT is a certification with more than 148-hours of training content and a 48 hour exam which provides real-world pentesting capabilities.

The eJPT introduces the following concepts:

  • The phases of a penetration test
  • How to approach a target systematically
  • How to move from information gathering to testing

The eJPT (eLearnSecurity Junior Penetration Tester) is important for pentesting because it provides structure, fundamentals, and real-world context at the very beginning of a pentester’s journey. Mimicking real-world scenarios and packed with dozens of practical labs, the eJPT builds skills required for hands-on engagements and affirms the individual’s capability to become an asset in any penetration testing team.

The exam is 48 hrs with 35 questions. There are 5–6 machines in DMZ and 1–2 machines in the internal network. You are required to pivot from the DMZ to the internal network and also escalate your priviledges.

Curriculum

My photo

Notes:

Tools

An overview of tools such as Nmap and Metasploit

Common Ports

Services on Common Ports and Attacks against it

Pivoting

Establishing a pivot point to move through a network after initial access

Linux Enumeration and Priviledge Escalation

Information Gathering on the compromised Linux host and increasing priviledges

Hosting

Information Gathering on the compromised Windows host and increasing priviledges


3. eWPT

eWPT is a hands-on, professional-level Red Team certification that simulates skills utilized during real-world engagements. The exam environment presents a scenario of a web application pentests that you need to perform on a collection of end-points. You have 10 hours to test the applications and services found in scope and 50 questions to answer in that time. You will need an overall passing score of 75% or above to pass the exam. The questions consist of multiple choice and short answer questions. These are contextual to the exam environment and may change between exams as it produces dynamic ‘flags’ to collect. Make no mistake, this is not a CTF style exam. You need to perform a pentest to uncover the answers.

Curriculum

My photo

Notes:

Information Gathering

An overview of tools such as Nmap and Metasploit

Cross Site Scripting

Attaching code onto a legitimate website that will execute when the victim loads the website.

SQL Injection

Code injection technique used to modify or retrieve data from SQL databases

Content Management Systems

Common attacks on CMS systems such as Wordpress and Joomla

Directory Traversal

Accessing unauthorized files and directories outside a web application's intended folder.

Tools

Exploring tools such as wafwoof and weeveley to automate attacks


4. BSCP

The Burp Suite Certified Practitioner (BSCP) is an official certification for web security professionals, from the makers of Burp Suite. Becoming a Burp Suite Certified Practitioner demonstrates a deep knowledge of web security vulnerabilities. The certification consist of a collection of 300+ labs.

Curriculum

Topic CategorySpecific TopicApprox. Number of Labs
Server‑Side VulnerabilitiesSQL Injection18 labs
Authentication14 labs
Path Traversal (Directory Traversal)6 labs
Command Injection5 labs
Business Logic Vulnerabilities11 labs
Information Disclosure5 labs
Access Control13 labs
File Upload Vulnerabilities7 labs
Race Conditions6 labs
Server‑Side Request Forgery (SSRF)7 labs
XXE Injection9 labs
NoSQL Injection4 labs
Client‑Side VulnerabilitiesCross‑Site Scripting (XSS)30 labs
Cross‑Site Request Forgery (CSRF)12 labs
Cross‑Origin Resource Sharing (CORS)4 labs
Clickjacking (UI Redressing)5 labs
DOM‑Based Vulnerabilities7 labs
WebSockets3 labs
Advanced / Other TopicsInsecure Deserialization10 labs
GraphQL API Vulnerabilities5 labs
Server‑Side Template Injection7 labs
Web Cache Poisoning13 labs
HTTP Host Header Attacks7 labs
HTTP Request Smuggling22 labs
OAuth Authentication6 labs
JWT Attacks8 labs
Prototype Pollution10 labs
Web LLM Attacks4 labs
Essential Skills2 labs

Notes:

Request Smuggling

An attack in which the web server and a proxy/load balancer disagree about where one HTTP request ends and the next begins. This lets the attacker “smuggle” a hidden request through the system.

Web Cache Attacks

Web cache Poisoning - the cache stores a malicious or incorrect response, which is then served to many users. Web Cache Deception - the cache stores private or sensitive content as if it were public.

JWT / oAuth Attacks

Misconfigurations in the configurations of JWT/oAuth expose security vulnerabilities.

Cross Origin Resource Sharing

The implementation of CORS may contain mistakes or be overly lenient to ensure that everything works, and this can result in exploitable vulnerabilities.

Prototype Pollution

It enables attackers to add arbitrary properties to global object prototypes, which may then be inherited by user-defined objects.

Insecure Deserialization

Insecure deserialization is when user-controllable data is deserialized by a website.