ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More info
- Ethical Hacker Tools
- Nsa Hacker Tools
- Pentest Tools Nmap
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Windows
- How To Hack
- Hacking Apps
- Hacking Tools For Pc
- How To Make Hacking Tools
- Hacking Tools For Mac
- Hacking Tools Online
- Hacker Tools
- Pentest Tools Online
- Hack Tools
- Hacking Tools Software
- Easy Hack Tools
- Hackrf Tools
- Hacking Tools Free Download
- Hacker Tool Kit
- Blackhat Hacker Tools
- How To Make Hacking Tools
- Hacks And Tools
- Hack Tools For Pc
- Computer Hacker
- Hacker Tool Kit
- Hacker Tools Online
- Hack Tools Download
- Hacking Tools For Kali Linux
- Hacking Tools Windows 10
- Termux Hacking Tools 2019
- Hacker Tools For Pc
- Hacker Tools For Windows
- Pentest Tools Open Source
- Black Hat Hacker Tools
- Hacking Tools For Mac
- Hacker Tools Free Download
- Hacking Tools Usb
- Pentest Tools Android
- Hacker Search Tools
- Underground Hacker Sites
- Hacking Tools Download
- Hacker Tools 2019
- Pentest Tools Tcp Port Scanner
- Tools For Hacker
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Ios
- Hacking Tools Software
- Hacking Tools For Mac
- Pentest Tools Framework
- Hacking Tools For Windows Free Download
- Ethical Hacker Tools
- Hacking Tools For Windows 7
- Nsa Hacker Tools
- Best Pentesting Tools 2018
- Hacking Tools Windows 10
- Pentest Tools Download
- Tools For Hacker
- Top Pentest Tools
- New Hack Tools
- Pentest Tools Github
- Nsa Hack Tools Download
- Hack Tools For Pc
- Pentest Tools Framework
- Underground Hacker Sites
- Hacking Tools For Beginners
- What Are Hacking Tools
- Computer Hacker
- Best Pentesting Tools 2018
- Hak5 Tools
- Pentest Tools Port Scanner
- Hacker Tools Linux
- Pentest Tools Github
- Hack Rom Tools
- Pentest Tools Open Source
- Computer Hacker
- Hack Tools Mac
- Best Pentesting Tools 2018
- Hack Tools For Windows
- Pentest Tools Website Vulnerability
- Best Hacking Tools 2019
- Hack Tool Apk
- Pentest Tools Github
- Termux Hacking Tools 2019
- Hacker Tools Mac
- Hacking Tools Software
- Hack Tools For Windows
- Pentest Tools For Mac
- Pentest Tools Url Fuzzer
- Top Pentest Tools
- What Is Hacking Tools
- Pentest Tools For Mac
- Hacker Tools Windows
- Android Hack Tools Github
- Hacker Tool Kit
- Hack Tools For Pc
- Hak5 Tools
- Hacker Tool Kit
- Pentest Reporting Tools
Posting Komentar