sábado, 27 de enero de 2024

eCPPTv2 - Penetration Testing Professional

 


ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.


Course prerequisites

  • Beginner knowledge in networking topics, protocols used on the Internet
  • Beginner knowledge in penetration testing topics
  • Ability to read and understand code
  • Course specifications
  • Course level: Intermediate
  • Time: 66 hours and 16 minutes
  • Includes: ‌ 83 videos | 30 labs | ‌ 118 slides
  • Master: Fabrizio Siciliano
  • ECPPTv2 Course Content - Penetration Testing Professional
  • System Security
  • Architecture Fundamentals
  • Assembler Debuggers and Tool Arsenal
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password Cracking
  • Malware
  • Network Security
  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing & MitM Attacks
  • Exploitation
  • Post Exploitation
  • Anonymity
  • Social Engineering
  • PowerShell for Pentesters
  • PowerShell Fundamentals
  • Offensive PowerShell
  • Linux Exploitation
  • Information Gathering
  • Exploitation over the Network
  • Post Exploitation
  • Web App Security
  • Information Gathering
  • Cross Site Scripting
  • SQL Injections
  • Other Common Web Attacks
  • Wi-Fi Security
  • Prerequisites
  • Environment Setup
  • Wireless Standards and Networks
  • Discover Wi-Fi Networks
  • Traffic Analysis
  • Attacking Wi-Fi Networks
  • Wi-Fi as Attack Vectors
  • Metasploit & Ruby
  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, and Scope
  • Classes, Modules, and Exceptions
  • Pentesters Prerequisites
  • Input Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit

More articles


  1. Hacking Tools Github
  2. Hack Tools Pc
  3. Hacking Tools For Kali Linux
  4. Pentest Tools Free
  5. Hack Tools
  6. Nsa Hack Tools Download
  7. Hacking Tools
  8. Hacking Tools Software
  9. What Is Hacking Tools
  10. Android Hack Tools Github
  11. Hack Tools Download
  12. Game Hacking
  13. Black Hat Hacker Tools
  14. Pentest Tools Android
  15. New Hack Tools
  16. Pentest Tools Framework
  17. Hacking Apps
  18. Pentest Tools Bluekeep
  19. Hacker Tools Linux
  20. Black Hat Hacker Tools
  21. Hacking Tools Name
  22. Hack Tool Apk
  23. Hack And Tools
  24. Pentest Tools For Windows
  25. Hack Tools For Pc
  26. What Is Hacking Tools
  27. Hack Tools For Pc
  28. Hacking Tools For Beginners
  29. Hacking App
  30. Hacker Tools Linux
  31. Hacker Tools
  32. Bluetooth Hacking Tools Kali
  33. Hacker Search Tools
  34. Hacker Tools Free Download
  35. Pentest Recon Tools
  36. Termux Hacking Tools 2019
  37. Hacking Tools For Windows 7
  38. Pentest Tools Apk
  39. Hacker Tools
  40. Hacking Apps
  41. Pentest Tools Open Source
  42. Pentest Reporting Tools
  43. Pentest Tools List
  44. Hack Tools Github
  45. Best Hacking Tools 2020
  46. Top Pentest Tools
  47. Hacker Tools For Pc
  48. Growth Hacker Tools
  49. Hacking Tools 2020
  50. Hak5 Tools
  51. Hacking Tools For Windows 7
  52. Nsa Hack Tools
  53. Physical Pentest Tools
  54. Hacking App
  55. Hacking Tools For Windows
  56. Hacker Tools For Ios
  57. Hacker Tools Apk
  58. Hacker Search Tools
  59. Hacking Tools Pc
  60. Pentest Tools Open Source

No hay comentarios:

Publicar un comentario

Buscar este blog

Seguidores

Archivo del blog