ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More articles
- Hacking Tools Hardware
- Pentest Tools Kali Linux
- Best Pentesting Tools 2018
- Hacking Tools Usb
- Pentest Tools Nmap
- Hack Tools Online
- Growth Hacker Tools
- Hacks And Tools
- Blackhat Hacker Tools
- Hacking Tools Usb
- Hacking Tools For Windows
- Pentest Recon Tools
- Nsa Hack Tools
- Hackrf Tools
- Easy Hack Tools
- Hacker Tools Linux
- Pentest Tools Website Vulnerability
- Pentest Tools Kali Linux
- Usb Pentest Tools
- Pentest Tools Subdomain
- Hacker Tools List
- Hacker Tools Hardware
- Free Pentest Tools For Windows
- Hack Website Online Tool
- Hackers Toolbox
- Hack Tools For Windows
- Hacks And Tools
- Android Hack Tools Github
- Hacking Tools Usb
- Top Pentest Tools
- Hack And Tools
- Hacker Tools
- Hak5 Tools
- Hacking Tools
- Android Hack Tools Github
- Install Pentest Tools Ubuntu
- Hackrf Tools
- What Is Hacking Tools
- Hacking Tools Online
- Hack Tools For Games
- Ethical Hacker Tools
- Hacker Security Tools
- Pentest Tools Framework
- Hack Tools
- Hacking Tools For Kali Linux
- Pentest Tools Linux
- Pentest Tools Github
- What Is Hacking Tools
- Ethical Hacker Tools
- Computer Hacker
- Hacking Tools Software
- Hack Tools For Pc
- Hack Tools For Mac
- Underground Hacker Sites
- Tools Used For Hacking
- Hacker Tools Apk
- Pentest Tools Website
- Hack Tools For Ubuntu
- Pentest Tools Free
- Hacking Tools Online
- Hackers Toolbox
- Pentest Tools Find Subdomains
- Nsa Hack Tools
- Hacker Tools Windows
- Pentest Tools For Windows
- Pentest Tools Linux
- Pentest Tools Alternative
- Hacking Tools Kit
- Tools Used For Hacking
- Pentest Tools Windows
- Hacking Tools Name
- Nsa Hacker Tools
- Pentest Tools For Ubuntu
- How To Hack
- Hack Tools Download
- Blackhat Hacker Tools
- Pentest Tools Framework
- Termux Hacking Tools 2019
- Hacking Tools Windows
- Hack Rom Tools
- Hacker Tools Software
- Underground Hacker Sites
- Hack Tools For Mac
- Underground Hacker Sites
- Hacker Tools For Mac
- Tools Used For Hacking
- Hacking Tools For Beginners
- Pentest Tools Github
- Pentest Tools Port Scanner
- New Hacker Tools
- Tools 4 Hack
No comments:
Post a Comment