ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More articles
- How To Hack
- Pentest Tools Apk
- Bluetooth Hacking Tools Kali
- Hacking Tools Usb
- Pentest Tools Download
- Computer Hacker
- Pentest Tools Apk
- Pentest Tools Website Vulnerability
- Pentest Tools Framework
- Hackrf Tools
- Pentest Tools Android
- Tools Used For Hacking
- Hacking Tools Mac
- Hacking Tools Software
- Hack Apps
- Pentest Tools Alternative
- Hackers Toolbox
- Pentest Tools For Mac
- Hacking Tools For Games
- Hak5 Tools
- Hack Tools 2019
- Hackrf Tools
- Hacking Tools Windows 10
- Hack Tools
- Nsa Hack Tools
- Hack Tool Apk
- Hacker Hardware Tools
- Computer Hacker
- What Is Hacking Tools
- Hacker Tools Mac
- Hacking Tools And Software
- What Are Hacking Tools
- Hack Tools 2019
- Tools For Hacker
- Hacking Tools Windows 10
- Hack Tools Mac
- Hack Apps
- Pentest Automation Tools
- Tools For Hacker
- Pentest Tools Subdomain
- Pentest Tools Linux
- Hacker Tools Github
- Blackhat Hacker Tools
- Hacking Tools Kit
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Pentest Tools Online
- Hacker Tools
- Pentest Tools Github
- Pentest Tools For Mac
- Hacking Tools Pc
- Hacking Tools Windows
- Pentest Tools For Mac
- Hacking Tools For Games
- Hacker Hardware Tools
- Hacking Tools Pc
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Windows Free Download
- Hacks And Tools
- Hack Website Online Tool
- Hacker Tools For Mac
- Hacker Tools 2020
- Hack Tools For Ubuntu
- Hack Tools For Ubuntu
- Hacker Tools Online
- Easy Hack Tools
- Hack Tool Apk
- Hack Tools For Pc
- Pentest Box Tools Download
- Hacking Tools For Windows 7
- Pentest Tools Apk
- Black Hat Hacker Tools
- Hack Tools Download
- Pentest Tools Framework
- Hacking Tools Mac
- Pentest Tools Website
- Ethical Hacker Tools
- Pentest Tools Port Scanner
- Hacking Tools
- Hacking Tools Usb
- Pentest Tools Subdomain
- Pentest Tools Kali Linux
- Wifi Hacker Tools For Windows
- Hacking Tools Mac
- Hack Tools Github
- Hack Tools Github
- Pentest Tools Online
- Hack Tools Online
- Blackhat Hacker Tools
- Hacking Tools For Games
- Hack Tools For Games
- How To Install Pentest Tools In Ubuntu
- Termux Hacking Tools 2019
- Black Hat Hacker Tools
- Hacking Tools For Pc
- Hacking Tools For Windows
- Pentest Tools Framework
- How To Hack
- Pentest Recon Tools
- Best Pentesting Tools 2018
- Hacking Tools For Mac
- Hack Tools For Ubuntu
- Hacker Hardware Tools
- Hacking Tools Windows
- Best Pentesting Tools 2018
- Pentest Tools Bluekeep
- What Are Hacking Tools
- Pentest Box Tools Download
- New Hack Tools
- New Hacker Tools
- Hack And Tools
- Game Hacking
- Hack Tools Github
- Hack And Tools
- Pentest Tools Kali Linux
- Hacker Tools Hardware
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hack Tools For Games
- Pentest Tools For Windows
- Pentest Tools Nmap
- Hack Tools 2019
- Hacking Tools And Software
- Hack And Tools
- Pentest Tools Online
- Pentest Tools Nmap
- Github Hacking Tools
- Nsa Hack Tools Download
- Beginner Hacker Tools
- World No 1 Hacker Software
- Hacking Tools Free Download
- Hacker Tools Apk Download
- Pentest Box Tools Download
- Hacker
- Black Hat Hacker Tools
No comments:
Post a Comment