eCPPTv2 - Penetration Testing Professional
ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
Related news
- Github Hacking Tools
- Hacker Search Tools
- Hacker Tools For Ios
- Pentest Tools Review
- Best Pentesting Tools 2018
- Nsa Hack Tools Download
- Pentest Tools Alternative
- Ethical Hacker Tools
- Hacking Tools For Windows Free Download
- Hack Tools For Ubuntu
- Usb Pentest Tools
- Top Pentest Tools
- Game Hacking
- Hacking Tools 2020
- Github Hacking Tools
- Hack Tools Mac
- Black Hat Hacker Tools
- Hacker
- Hack Tools
- Hack App
- Pentest Tools Free
- Bluetooth Hacking Tools Kali
- Blackhat Hacker Tools
- Hack Tool Apk No Root
- Nsa Hack Tools Download
- Hack Tool Apk
- Hacker Tools 2020
- Hacking Tools Online
- Hacking Tools Online
- How To Make Hacking Tools
- Pentest Tools Nmap
- Hacking Tools
- Pentest Tools Github
- Hacker Security Tools
- World No 1 Hacker Software
- Pentest Automation Tools
- Pentest Automation Tools
- Hacking Tools Github
- Hack Tools For Pc
- What Is Hacking Tools
- Pentest Tools Apk
- Hacks And Tools
- Pentest Tools Kali Linux
- Pentest Box Tools Download
- Hacker Tools Free
- Pentest Tools Free
- Hack Tools Github
- Tools For Hacker
- Termux Hacking Tools 2019
- Hack Tools For Ubuntu
- What Is Hacking Tools
- Game Hacking
- Hacker Security Tools
- What Is Hacking Tools
- Hacking Tools For Windows 7
- Hacker Tools Software
- Pentest Tools Online
- Free Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Pentest Tools Open Source
- Hacker Hardware Tools
- Nsa Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Mac
- Pentest Tools Framework
- Hack Tools For Windows
- Hacking Tools Windows 10
- Hacking Tools Mac
- Hacker Tools Linux
- Hacker Tools Free Download
- Hack Website Online Tool
- Pentest Reporting Tools
- Hack Tools For Games
- Hack Tools Mac
- World No 1 Hacker Software
- Beginner Hacker Tools
- Hacking Tools Github
- Pentest Tools Open Source
- Pentest Tools Port Scanner
- Game Hacking
- Beginner Hacker Tools
- Pentest Tools Port Scanner
- Hacker Tools Mac
- Hacker Tools Windows
- Pentest Tools Github
- Hack Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Search Tools
- Hacker Techniques Tools And Incident Handling
Write admin description here..
Get Updates
Subscribe to our e-mail newsletter to receive updates.
Share This Post
Related posts
0 comentarios:
Publicar un comentario