ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related news
- How To Install Pentest Tools In Ubuntu
- Hackers Toolbox
- Hacker Tools Windows
- Black Hat Hacker Tools
- Hacking Tools For Windows 7
- Hack Apps
- Pentest Tools
- Hacks And Tools
- Hack Tool Apk No Root
- Pentest Tools Tcp Port Scanner
- Hack Tools For Windows
- Wifi Hacker Tools For Windows
- Hack Rom Tools
- Hacking Tools Online
- Tools 4 Hack
- Hack Rom Tools
- Pentest Tools For Windows
- Hackrf Tools
- Hack App
- Hacking Tools For Windows Free Download
- Pentest Tools Kali Linux
- Hacking Tools Windows 10
- Physical Pentest Tools
- Pentest Tools Kali Linux
- Underground Hacker Sites
- Hack Tool Apk
- Blackhat Hacker Tools
- Hack App
- Tools Used For Hacking
- Pentest Recon Tools
- How To Make Hacking Tools
- Hack Rom Tools
- Pentest Tools For Windows
- Game Hacking
- Hacking Tools Windows
- Pentest Tools Alternative
- Computer Hacker
- Hacking Tools Hardware
- Nsa Hack Tools Download
- Hacking Tools For Kali Linux
- Pentest Tools Kali Linux
- Hackrf Tools
- Physical Pentest Tools
- Hacker Tools For Windows
- Hacking Tools Software
- Bluetooth Hacking Tools Kali
- Hacker Tools 2019
- Underground Hacker Sites
- Hacking Tools Name
- Ethical Hacker Tools
- Hacker Tools Windows
- Hacking Tools For Mac
- Pentest Tools Apk
- Pentest Tools Apk
- Hacking Tools For Pc
- Free Pentest Tools For Windows
- Hacker Tools List
- Pentest Tools Free
- Best Pentesting Tools 2018
- Pentest Box Tools Download
- Hacking Tools Download
- Hacks And Tools
- Hacker Tools 2019
- Hacker Tools Software
- Hack Tools 2019
- Free Pentest Tools For Windows
- Tools 4 Hack
- Hacking Tools Online
- Hacker Tools For Mac
- Hack Tools Download
- Pentest Tools Review
- Hacking Tools Mac
- Pentest Tools List
- Free Pentest Tools For Windows
- Hacker Tools 2019
- Hack Tools For Mac
- Top Pentest Tools
- Pentest Tools For Mac
- What Is Hacking Tools
- Pentest Tools Kali Linux
- Pentest Recon Tools
- Hacker Tools
- Hacking Tools 2019
- Hacker Search Tools
- How To Make Hacking Tools
- Pentest Tools
- Best Hacking Tools 2020
- Hack Tools For Mac
- Hack Tools For Games
- Hacker Tools Hardware
- Pentest Tools List
- Pentest Tools Open Source
- Hacker
- Nsa Hack Tools
- Hack Tools For Pc
- Hacking Tools Hardware
- Tools 4 Hack
- Pentest Tools Android
- Hack Tools For Windows
- Hacking Tools Free Download
- Best Hacking Tools 2020
- Hacking Tools For Kali Linux
- Pentest Tools Website
- Termux Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Beginner Hacker Tools
- Hackers Toolbox
- Wifi Hacker Tools For Windows
- Pentest Tools
- Hacking Tools And Software
- Easy Hack Tools
- Hacking Tools For Pc
- World No 1 Hacker Software
- Hacking Tools 2020
- Hacking Tools For Windows
- Tools 4 Hack
- Hacker Security Tools
- Hacker Tools For Mac
- Best Hacking Tools 2020
- New Hack Tools
- Pentest Tools Website Vulnerability
- How To Install Pentest Tools In Ubuntu
- Termux Hacking Tools 2019
- Hacker Tools Github
- Hack Tool Apk
- Hacking Tools 2020
- Hacking Tools Kit
- Hacker Tools Hardware
- Pentest Automation Tools
- Hack Tools Github
- New Hacker Tools
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου