ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More articles
- Hacker Tools For Ios
- Wifi Hacker Tools For Windows
- How To Hack
- Hacking Tools Hardware
- How To Hack
- Hacking Tools 2020
- Hacking Tools Windows
- Hacking Tools For Windows
- Termux Hacking Tools 2019
- Hacks And Tools
- Hack Tools Download
- Pentest Reporting Tools
- Nsa Hacker Tools
- What Is Hacking Tools
- Black Hat Hacker Tools
- Pentest Tools
- Beginner Hacker Tools
- Hack Tools 2019
- Hacker Tools Linux
- Pentest Tools Website
- Hacker Tools For Ios
- Hacking Tools Kit
- Hacker Tools For Windows
- Hack And Tools
- Easy Hack Tools
- Hacker Tools Github
- New Hacker Tools
- Pentest Tools Github
- Free Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Tools Used For Hacking
- Hack Tools Github
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Url Fuzzer
- Termux Hacking Tools 2019
- Growth Hacker Tools
- Hack Tools For Pc
- Hack And Tools
- Hack Tools For Pc
- Hacking App
- Hacker Tools For Ios
- Hack Website Online Tool
- Hacker Tools Linux
- Pentest Box Tools Download
- Ethical Hacker Tools
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hacking Tools And Software
- How To Install Pentest Tools In Ubuntu
- Hacking Tools 2020
- Pentest Tools Port Scanner
- Hacker Tools Windows
- Hack Tools For Mac
- Hack Tools Github
- Bluetooth Hacking Tools Kali
- Hacking Apps
- Hacking Tools Hardware
- Hacker Techniques Tools And Incident Handling
- Hackers Toolbox
- Best Hacking Tools 2019
- Hacker Tools Hardware
- Hacker Tools Free Download
- Hacking Tools Name
- Pentest Tools Website
- Hacker Tool Kit
- Hacker Tools Hardware
- Beginner Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking Tools For Games
- Hacker
- Hacker Tools Mac
- Hacker Tools Apk Download
- Wifi Hacker Tools For Windows
Nessun commento:
Posta un commento