ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related posts
- Hacker Tool Kit
- Ethical Hacker Tools
- Tools 4 Hack
- Hacker Tools 2020
- Hacker Tools Mac
- Top Pentest Tools
- Pentest Tools Github
- Tools For Hacker
- Underground Hacker Sites
- Hacker Tools Hardware
- Pentest Tools For Mac
- Hack Apps
- Hacking Tools Free Download
- Hack Tools
- Easy Hack Tools
- Hacking Tools Kit
- Hacks And Tools
- Pentest Tools List
- Install Pentest Tools Ubuntu
- Beginner Hacker Tools
- Hack Tools 2019
- Hacking Tools Github
- Hacker Tools Apk Download
- New Hacker Tools
- Hacking Tools For Games
- Hacking Tools Windows 10
- Hack Tools Download
- New Hack Tools
- Hacker Tools Apk Download
- Hacker Tools Online
- Pentest Recon Tools
- Best Pentesting Tools 2018
- Hacking Tools Pc
- Underground Hacker Sites
- Hacking Tools Hardware
- Hacker Search Tools
- Termux Hacking Tools 2019
- Hacker Tools Linux
- Hacker
- World No 1 Hacker Software
- Pentest Tools For Android
- Hack Website Online Tool
- Hacker Tools For Mac
- Hack Tools For Mac
- Usb Pentest Tools
- Pentest Tools Apk
- Hacking Tools For Windows
- Hack Tools For Ubuntu
- Pentest Tools Open Source
- Ethical Hacker Tools
- Hacking Tools For Games
- Hacker Tools Free
- Hacking Tools Mac
- Pentest Tools Alternative
- Hack And Tools
- Hacker Tools 2019
- Hacker Security Tools
- Hack Tools For Games
- Hackrf Tools
- Pentest Tools Open Source
- Hacker Tools 2019
- Hacker Tools Linux
- Hacker Search Tools
- Nsa Hack Tools Download
- Hacker Tools Apk Download
- Pentest Tools Framework
- Pentest Tools Online
- Pentest Tools Free
No comments:
Post a Comment