ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related links
- Best Hacking Tools 2020
- Hacker
- Pentest Tools Tcp Port Scanner
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Online
- Pentest Tools Android
- Hack Tools For Pc
- Blackhat Hacker Tools
- Pentest Tools Port Scanner
- Hacking Tools Mac
- Tools 4 Hack
- Kik Hack Tools
- Hacking Tools For Mac
- Pentest Tools Bluekeep
- Hacker Tools Online
- Black Hat Hacker Tools
- Beginner Hacker Tools
- Hacker Tools Mac
- Hacking Tools Windows
- Hack Tools For Games
- Hack Tools Mac
- Hacker Tools Apk Download
- Hacking Tools For Beginners
- Hacker Security Tools
- Tools 4 Hack
- Best Hacking Tools 2019
- Hacker Hardware Tools
- Hacker Tools Hardware
- Hacker Tools 2020
- Top Pentest Tools
- Android Hack Tools Github
- Bluetooth Hacking Tools Kali
- Hacking Tools Download
- Pentest Tools Windows
- Pentest Tools For Android
- Hack Tools
- Pentest Tools Website Vulnerability
- Hack Tools Mac
- Hacker Tools
- Tools 4 Hack
- Hacker
- Best Hacking Tools 2019
- Tools 4 Hack
- Pentest Tools For Windows
- Wifi Hacker Tools For Windows
- New Hacker Tools
- Hack Apps
- Top Pentest Tools
- Hacking Apps
- How To Install Pentest Tools In Ubuntu
- Best Hacking Tools 2020
- Hak5 Tools
- Computer Hacker
- Hacking Tools For Windows
- Hack Tools For Games
- Hacker Tools Online
- Hacker Search Tools
- Hacking Tools Online
- Pentest Tools Github
- Hacking App
- Hacker Hardware Tools
- Pentest Tools
- Hack Tools For Windows
- Hack Tools Mac
- Pentest Tools For Android
- Pentest Tools Download
- Hack Tools
- Hacking Tools For Windows
- Ethical Hacker Tools
- Pentest Tools Online
- Hacking App
- Hacks And Tools
- Hack Tools For Pc
- Hacker Tools Windows
No comments:
Post a Comment