ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related links
- Hacking Tools For Mac
- Blackhat Hacker Tools
- Pentest Tools Github
- Hacker Tools Apk
- Beginner Hacker Tools
- Hacker Tools Hardware
- Black Hat Hacker Tools
- Pentest Tools Linux
- Hacking Tools Windows 10
- Hacking Tools Free Download
- Tools 4 Hack
- Pentest Tools Linux
- Hacking Tools Pc
- Pentest Recon Tools
- Hacking Tools Free Download
- Hack Tools 2019
- Hacker Tools Online
- Termux Hacking Tools 2019
- Growth Hacker Tools
- Hack Apps
- Pentest Tools Android
- Hacking Apps
- Pentest Tools Github
- Pentest Tools Review
- Pentest Tools Subdomain
- Free Pentest Tools For Windows
- Hacking Tools Hardware
- Hacker Tools 2020
- What Is Hacking Tools
- Computer Hacker
- Hack Tool Apk No Root
- Hack And Tools
- Kik Hack Tools
- Hack Rom Tools
- Hackers Toolbox
- Hacking Apps
- Hack Rom Tools
- Tools For Hacker
- Hacker Tools List
- Hack Tools 2019
- Pentest Tools Review
- Hack Tools For Mac
- Hacking Tools Mac
- Hacker Tools List
- Hacker Tools Linux
- Pentest Tools Free
- Pentest Tools Review
- Hacking Tools
- Hack Rom Tools
- Hacking Tools Software
- Pentest Tools Website Vulnerability
- Hacker Tools For Ios
- Pentest Tools Windows
- Growth Hacker Tools
- Hacker Tools Hardware
- Hacking Tools Usb
- Hacking Tools Name
- Hacking Tools For Windows
- Physical Pentest Tools
- Hack And Tools
- Hack Tools For Mac
- Tools Used For Hacking
- Black Hat Hacker Tools
- Pentest Tools Bluekeep
- Hacker Tools Github
- Hack Rom Tools
- Hack Rom Tools
- Hacking Tools Online
- Pentest Tools Open Source
- Pentest Tools Github
- Hacking Tools And Software
- Game Hacking
- Pentest Tools Nmap
- Beginner Hacker Tools
- Hack Apps
- What Are Hacking Tools
- Hack Tools Download
- Pentest Tools For Mac
- Pentest Tools Subdomain
- Hacking Tools Mac
- Hack Tools
- Hack Tools Mac
- Hacker Tools List
- What Is Hacking Tools
- Usb Pentest Tools
- Pentest Tools Alternative
- Pentest Tools Framework
- Hack Tools For Mac
- Hacking Tools For Windows Free Download
- Hack Tools
- Hack Tools For Windows
- Install Pentest Tools Ubuntu
- Hacker Tools Free Download
- Hacking Tools Name
- Hacking Tools Free Download
- How To Make Hacking Tools
- Hacker Tools List
- Hacker Search Tools
No comments:
Post a Comment