eCPPTv2 - Penetration Testing Professional
ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related links
- Underground Hacker Sites
- Beginner Hacker Tools
- Hack Tools 2019
- Pentest Recon Tools
- Hacking Tools Software
- Pentest Tools For Android
- Game Hacking
- Hacker Tools Linux
- Hacking Tools 2020
- Hak5 Tools
- Pentest Tools Website
- Pentest Tools Windows
- New Hacker Tools
- Hack Tools 2019
- Pentest Tools Online
- Hacking Tools For Beginners
- Pentest Tools Free
- Hacker Tools Free
- Pentest Tools Port Scanner
- Hacker Tools Apk
- Game Hacking
- Pentest Tools Kali Linux
- Hacker Tools 2020
- Pentest Tools Android
- Hacking Tools For Mac
- Hacking Tools Software
- Hacker Tools 2019
- Hacking Tools Name
- Pentest Tools Apk
- Ethical Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Free
- Hacking Tools For Games
- Pentest Tools For Mac
- Kik Hack Tools
- Hacker Tools Hardware
- Hacking Tools And Software
- Install Pentest Tools Ubuntu
- Usb Pentest Tools
- Hacking Tools Pc
- Pentest Tools Online
- Hacking Tools For Windows
- Hacker Tools 2019
- Kik Hack Tools
- Hack Tools For Games
- Pentest Tools Review
- Tools 4 Hack
- Tools For Hacker
- Hacking Tools
- Hacker Tools For Pc
- Underground Hacker Sites
- How To Make Hacking Tools
- How To Hack
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Free
- Pentest Tools For Android
- Top Pentest Tools
- Computer Hacker
- Best Hacking Tools 2020
- Hack Tools Download
- Hacker
- Hacking Tools Name
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- Pentest Tools For Ubuntu
- Hack Tools 2019
- Hacking Tools And Software
- Pentest Tools Tcp Port Scanner
- Pentest Tools Linux
- Hacking Tools
- Hacking Tools Free Download
- Hacking Tools Usb
- Android Hack Tools Github
- Hacker
- Pentest Tools For Mac
- Hacking Tools Name
0 Comments:
Post a Comment
<< Home