ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related articles
- Pentest Tools Website Vulnerability
- Pentest Tools Framework
- Blackhat Hacker Tools
- Easy Hack Tools
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hack Tool Apk
- Hacking Tools For Kali Linux
- Hacking Tools 2020
- Hacker Techniques Tools And Incident Handling
- Hacker Techniques Tools And Incident Handling
- Hackers Toolbox
- Pentest Tools Linux
- How To Make Hacking Tools
- Blackhat Hacker Tools
- Hacking Tools
- Hack Tools For Pc
- Hacker Tools For Pc
- Hacker Tools For Windows
- Hacker
- Hacking Tools Free Download
- Hacker
- Hacker Tools Linux
- Hacking Tools 2019
- Hacking Tools 2019
- New Hack Tools
- Hack Tools
- Hacker Tools Hardware
- Pentest Tools Review
- Hack Tools For Pc
- Pentest Tools Website
- Pentest Tools Kali Linux
- Hack Tools Mac
- Hacking Tools For Windows 7
- Hacker Tools List
- Pentest Tools Website Vulnerability
- Android Hack Tools Github
- Hackers Toolbox
- Hack Tools Mac
- Best Pentesting Tools 2018
- Pentest Tools Kali Linux
- Hacker Tools List
- Hacker Tool Kit
- How To Install Pentest Tools In Ubuntu
- Hacking Tools And Software
- Hacking Tools Software
- Hacker Tools Github
- Hacker
- Hacking Tools Software
- Pentest Tools Website
- Hack Tool Apk
- Hacking Tools Mac
- Hacker Tools Online
- Hack Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacker
- How To Hack
- Pentest Tools For Ubuntu
- Hacking Tools 2020
- Hacker Tools Apk
- Hack Tool Apk No Root
- Hack Website Online Tool
- Computer Hacker
- Physical Pentest Tools
- Install Pentest Tools Ubuntu
- Hacking Apps
- Hacking Tools For Mac
- Hack App
- Hacking Tools Github
- Best Pentesting Tools 2018
No comments:
Post a Comment