ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.


Course prerequisites

  • Beginner knowledge in networking topics, protocols used on the Internet
  • Beginner knowledge in penetration testing topics
  • Ability to read and understand code
  • Course specifications
  • Course level: Intermediate
  • Time: 66 hours and 16 minutes
  • Includes: ‌ 83 videos | 30 labs | ‌ 118 slides
  • Master: Fabrizio Siciliano
  • ECPPTv2 Course Content - Penetration Testing Professional
  • System Security
  • Architecture Fundamentals
  • Assembler Debuggers and Tool Arsenal
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password Cracking
  • Malware
  • Network Security
  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing & MitM Attacks
  • Exploitation
  • Post Exploitation
  • Anonymity
  • Social Engineering
  • PowerShell for Pentesters
  • PowerShell Fundamentals
  • Offensive PowerShell
  • Linux Exploitation
  • Information Gathering
  • Exploitation over the Network
  • Post Exploitation
  • Web App Security
  • Information Gathering
  • Cross Site Scripting
  • SQL Injections
  • Other Common Web Attacks
  • Wi-Fi Security
  • Prerequisites
  • Environment Setup
  • Wireless Standards and Networks
  • Discover Wi-Fi Networks
  • Traffic Analysis
  • Attacking Wi-Fi Networks
  • Wi-Fi as Attack Vectors
  • Metasploit & Ruby
  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, and Scope
  • Classes, Modules, and Exceptions
  • Pentesters Prerequisites
  • Input Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit

More info


  1. Ethical Hacker Tools
  2. Nsa Hacker Tools
  3. Pentest Tools Nmap
  4. Hacking App
  5. How To Install Pentest Tools In Ubuntu
  6. Hack Tools For Windows
  7. How To Hack
  8. Hacking Apps
  9. Hacking Tools For Pc
  10. How To Make Hacking Tools
  11. Hacking Tools For Mac
  12. Hacking Tools Online
  13. Hacker Tools
  14. Pentest Tools Online
  15. Hack Tools
  16. Hacking Tools Software
  17. Easy Hack Tools
  18. Hackrf Tools
  19. Hacking Tools Free Download
  20. Hacker Tool Kit
  21. Blackhat Hacker Tools
  22. How To Make Hacking Tools
  23. Hacks And Tools
  24. Hack Tools For Pc
  25. Computer Hacker
  26. Hacker Tool Kit
  27. Hacker Tools Online
  28. Hack Tools Download
  29. Hacking Tools For Kali Linux
  30. Hacking Tools Windows 10
  31. Termux Hacking Tools 2019
  32. Hacker Tools For Pc
  33. Hacker Tools For Windows
  34. Pentest Tools Open Source
  35. Black Hat Hacker Tools
  36. Hacking Tools For Mac
  37. Hacker Tools Free Download
  38. Hacking Tools Usb
  39. Pentest Tools Android
  40. Hacker Search Tools
  41. Underground Hacker Sites
  42. Hacking Tools Download
  43. Hacker Tools 2019
  44. Pentest Tools Tcp Port Scanner
  45. Tools For Hacker
  46. Hacking Tools Software
  47. Hacker Techniques Tools And Incident Handling
  48. Hacker Tools For Ios
  49. Hacking Tools Software
  50. Hacking Tools For Mac
  51. Pentest Tools Framework
  52. Hacking Tools For Windows Free Download
  53. Ethical Hacker Tools
  54. Hacking Tools For Windows 7
  55. Nsa Hacker Tools
  56. Best Pentesting Tools 2018
  57. Hacking Tools Windows 10
  58. Pentest Tools Download
  59. Tools For Hacker
  60. Top Pentest Tools
  61. New Hack Tools
  62. Pentest Tools Github
  63. Nsa Hack Tools Download
  64. Hack Tools For Pc
  65. Pentest Tools Framework
  66. Underground Hacker Sites
  67. Hacking Tools For Beginners
  68. What Are Hacking Tools
  69. Computer Hacker
  70. Best Pentesting Tools 2018
  71. Hak5 Tools
  72. Pentest Tools Port Scanner
  73. Hacker Tools Linux
  74. Pentest Tools Github
  75. Hack Rom Tools
  76. Pentest Tools Open Source
  77. Computer Hacker
  78. Hack Tools Mac
  79. Best Pentesting Tools 2018
  80. Hack Tools For Windows
  81. Pentest Tools Website Vulnerability
  82. Best Hacking Tools 2019
  83. Hack Tool Apk
  84. Pentest Tools Github
  85. Termux Hacking Tools 2019
  86. Hacker Tools Mac
  87. Hacking Tools Software
  88. Hack Tools For Windows
  89. Pentest Tools For Mac
  90. Pentest Tools Url Fuzzer
  91. Top Pentest Tools
  92. What Is Hacking Tools
  93. Pentest Tools For Mac
  94. Hacker Tools Windows
  95. Android Hack Tools Github
  96. Hacker Tool Kit
  97. Hack Tools For Pc
  98. Hak5 Tools
  99. Hacker Tool Kit
  100. Pentest Reporting Tools

Posting Komentar

 
Top