ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More information
- Free Pentest Tools For Windows
- Hack Tools Pc
- Hacking Tools 2020
- New Hacker Tools
- Hacking App
- Hacking Tools Download
- Pentest Tools For Windows
- Hack Tools For Ubuntu
- Hacker Tools For Pc
- Blackhat Hacker Tools
- Hack Tools For Games
- Hacker
- Pentest Tools
- Pentest Recon Tools
- Pentest Recon Tools
- Hacker Search Tools
- Android Hack Tools Github
- Pentest Box Tools Download
- Hack Tools
- Hacking Tools 2020
- Hack Tools
- Hackers Toolbox
- Hacking Tools 2020
- Nsa Hack Tools
- Hack And Tools
- Hacking Tools For Kali Linux
- Hack Tools Online
- Hack Apps
- Hacker
- Hacks And Tools
- Hack Apps
- Pentest Tools For Ubuntu
- New Hack Tools
- Usb Pentest Tools
- World No 1 Hacker Software
- Pentest Tools For Android
- Hacking Tools For Mac
- Hacker Tools Github
- Hacking Tools Pc
- Hacker
- Pentest Tools Subdomain
- Hacker Tools Online
- Hacker Tools Free Download
- Pentest Tools Tcp Port Scanner
- Top Pentest Tools
- Hacker Tools Online
- Pentest Tools Apk
- Pentest Tools Tcp Port Scanner
- Hack Tools
- Hacker Tools Hardware
- Black Hat Hacker Tools
- Pentest Recon Tools
- Hack Tool Apk No Root
- Hack Tools 2019
- Hacker Search Tools
- Hacking Tools Usb
- Growth Hacker Tools
- Hacking Tools Online
- Hack Tools For Mac
- Hack Tools 2019
- Hacking Tools Windows
- Underground Hacker Sites
- Usb Pentest Tools
- Hacker Tools
- Usb Pentest Tools
- New Hacker Tools
- Hacker Tools Free Download
- How To Hack
- Hacker Hardware Tools
- Hack Tools For Pc
- Hacker Tools Hardware
- Hacker Tools Free Download
- Hackers Toolbox
- Pentest Tools Review
- Hack Tools 2019
- Hacker Tools Software
- Hacking Tools Github
- How To Make Hacking Tools
- Pentest Tools Nmap
- Ethical Hacker Tools
No comments:
Post a Comment