eCPPTv2 - Penetration Testing Professional
ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More articles
- Blackhat Hacker Tools
- Hackers Toolbox
- Pentest Tools Linux
- How To Hack
- Hack Tool Apk
- Hack Tools Pc
- Hack Tool Apk
- Easy Hack Tools
- Hacker Tools Github
- Nsa Hack Tools
- Pentest Tools For Windows
- Free Pentest Tools For Windows
- Hack Tools Pc
- Best Hacking Tools 2019
- Github Hacking Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Find Subdomains
- Hacker
- Hacking Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Free
- How To Make Hacking Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Windows
- Termux Hacking Tools 2019
- Hacker Tools Windows
- Hacker Tools Free Download
- Nsa Hack Tools
- Hacker Tools For Pc
- Pentest Tools Download
- Hacking Tools 2019
- Nsa Hack Tools
- Pentest Tools Review
- Pentest Tools For Windows
- Hack Apps
- Pentest Tools Website Vulnerability
- Pentest Tools For Ubuntu
- Hacking Tools Windows
- Pentest Tools Open Source
- Hack Tools For Windows
- Pentest Tools Free
- Growth Hacker Tools
- Hacker Tools Apk Download
- Hackers Toolbox
- Hacker Tools For Mac
- Pentest Tools Github
- Hacker Tools Online
- Pentest Reporting Tools
- Hacking Tools For Windows Free Download
- Hacking Tools Name
- Pentest Tools Nmap
- Hack Tools Pc
- Free Pentest Tools For Windows
- Pentest Tools Open Source
- Tools 4 Hack
- Hacker Tool Kit
- How To Make Hacking Tools
- Hacker
- Hacking Tools Github
- Hack App
- Hack Tools 2019
- Hacking Tools Free Download
- Pentest Tools For Android
- Install Pentest Tools Ubuntu
- Hack Tools Mac
- Hacking Tools Name
- Pentest Tools Download
- Hacker Tools Mac
- Hacker Tools Mac
- Hacking Tools For Games
- World No 1 Hacker Software
- Hacker Tools Free
- Hacker Tools Github
- Usb Pentest Tools
- Github Hacking Tools
- Top Pentest Tools
- Hacking Tools For Games
- Usb Pentest Tools
- Hacking Tools Windows 10
- Pentest Tools List
- Pentest Tools Subdomain
- Pentest Tools Apk
- Pentest Tools For Android
- Hacking Tools Hardware
- Pentest Tools Website
- Hack Tools For Ubuntu
- Hacker Tools
- Pentest Tools Windows
- Best Hacking Tools 2019
- Pentest Tools List
- Hacking Tools For Mac
- Hack Rom Tools
0 Comments:
Post a Comment
<< Home