ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More articles
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Github
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Hacking Tools 2019
- Hack Tools For Ubuntu
- Pentest Tools Github
- Pentest Tools Android
- Hack Tools Pc
- Wifi Hacker Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hack Tools Online
- Hacking Tools For Pc
- Hacking Tools Windows 10
- Pentest Tools Review
- Android Hack Tools Github
- Hacker Tools Mac
- Pentest Recon Tools
- Black Hat Hacker Tools
- Pentest Tools Windows
- Pentest Tools Free
- Hacking App
- Hacking Tools For Windows Free Download
- Nsa Hack Tools
- Hack Tools Mac
- Hacker Tools Software
- Nsa Hacker Tools
- Pentest Tools Open Source
- Pentest Reporting Tools
- New Hacker Tools
- Hack App
- Tools For Hacker
- Hack Tools Github
- Pentest Tools
- Hacking Tools Windows
- Pentest Tools Url Fuzzer
- New Hack Tools
- Hacking Tools Software
- Pentest Tools Kali Linux
- Pentest Tools Framework
- World No 1 Hacker Software
- Hacking Tools 2020
- Tools For Hacker
- Hacker Tools Apk
- Underground Hacker Sites
- Nsa Hack Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Url Fuzzer
- Hacking Tools Free Download
- Pentest Tools Free
- Pentest Tools For Windows
- Hack Rom Tools
- Hack Tools Online
- Hacking Tools
- Pentest Tools Online
- Hacking Tools For Beginners
- Hacking Tools For Beginners
- Hacker Tools Hardware
- Pentest Tools Find Subdomains
- Hacker Tools Apk
- Pentest Tools Website
- Pentest Tools For Windows
- What Are Hacking Tools
- Hacking Tools Usb
- Hack Website Online Tool
- Nsa Hack Tools
- Hacking Tools Hardware
- Hacker Tools For Pc
- Pentest Tools Linux
- Hacking Tools Usb
- Hacking Tools Free Download
- Hack Tool Apk
No comments:
Post a Comment