ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Read more
- Hacking Tools 2020
- Github Hacking Tools
- Growth Hacker Tools
- Hacking Apps
- Pentest Tools For Windows
- Termux Hacking Tools 2019
- Hacker
- Hacking Tools For Games
- Hacking Tools Free Download
- Hackrf Tools
- Pentest Tools Download
- Hacking Apps
- Hack Website Online Tool
- Hacker Tools For Mac
- Hacker Hardware Tools
- Hacking Tools Download
- Pentest Tools Website Vulnerability
- Free Pentest Tools For Windows
- Pentest Recon Tools
- Physical Pentest Tools
- How To Hack
- Hacker Tools 2020
- Hacking Tools 2019
- Hack Tools Pc
- Hacking Tools Kit
- Android Hack Tools Github
- Hacker Tools Windows
- Hack Tools Online
- Hack Rom Tools
- Pentest Tools For Ubuntu
- Pentest Tools Windows
- Hacking Tools 2019
- Hacker
- Hacker Tools Free Download
- What Are Hacking Tools
- Hacker Tools Linux
- Hacking Tools For Mac
- Hacking Tools Download
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows 7
- Hack Tools For Ubuntu
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Mac
- Usb Pentest Tools
- Pentest Tools Kali Linux
- Hacking Tools For Pc
- Hacking Tools Windows
- Pentest Tools For Mac
- Hacker Tools List
- Black Hat Hacker Tools
- Hack Apps
- Hacking Tools Pc
- Ethical Hacker Tools
- Pentest Tools Kali Linux
- Hacking Tools Software
- Hacking Tools Online
- Pentest Tools Open Source
- Hacking Tools Kit
- Computer Hacker
- Termux Hacking Tools 2019
- Pentest Tools Alternative
- Pentest Tools For Mac
- Hacking Tools Name
- Pentest Tools Free
- New Hacker Tools
- Ethical Hacker Tools
- Pentest Tools List
- Hacks And Tools
- Pentest Automation Tools
- Game Hacking
- Hacking Tools Windows
- How To Make Hacking Tools
- Pentest Tools Subdomain
- Hacking Tools Download
- How To Hack
- Hacking Tools For Beginners
- Hacker Tools For Mac
- Best Hacking Tools 2020
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Review
- Hacker
- Hacking Tools Windows
- New Hacker Tools
- Beginner Hacker Tools
- Hacking Tools For Mac
- Hack Tools For Ubuntu
- Hacking Tools For Beginners
- Hack Tools 2019
- Hacker Tools Apk
Tidak ada komentar:
Posting Komentar