Thursday, January 25, 2024

eCPPTv2 - Penetration Testing Professional

 


ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.


Course prerequisites

  • Beginner knowledge in networking topics, protocols used on the Internet
  • Beginner knowledge in penetration testing topics
  • Ability to read and understand code
  • Course specifications
  • Course level: Intermediate
  • Time: 66 hours and 16 minutes
  • Includes: ‌ 83 videos | 30 labs | ‌ 118 slides
  • Master: Fabrizio Siciliano
  • ECPPTv2 Course Content - Penetration Testing Professional
  • System Security
  • Architecture Fundamentals
  • Assembler Debuggers and Tool Arsenal
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password Cracking
  • Malware
  • Network Security
  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing & MitM Attacks
  • Exploitation
  • Post Exploitation
  • Anonymity
  • Social Engineering
  • PowerShell for Pentesters
  • PowerShell Fundamentals
  • Offensive PowerShell
  • Linux Exploitation
  • Information Gathering
  • Exploitation over the Network
  • Post Exploitation
  • Web App Security
  • Information Gathering
  • Cross Site Scripting
  • SQL Injections
  • Other Common Web Attacks
  • Wi-Fi Security
  • Prerequisites
  • Environment Setup
  • Wireless Standards and Networks
  • Discover Wi-Fi Networks
  • Traffic Analysis
  • Attacking Wi-Fi Networks
  • Wi-Fi as Attack Vectors
  • Metasploit & Ruby
  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, and Scope
  • Classes, Modules, and Exceptions
  • Pentesters Prerequisites
  • Input Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit

Related articles


  1. Pentest Tools Framework
  2. Hack Tools
  3. Hack Tools For Ubuntu
  4. Pentest Tools Subdomain
  5. Hacking Tools Download
  6. Pentest Box Tools Download
  7. Hacker Tools Windows
  8. Pentest Tools Subdomain
  9. Tools 4 Hack
  10. Hack Tools For Ubuntu
  11. Tools Used For Hacking
  12. World No 1 Hacker Software
  13. World No 1 Hacker Software
  14. Pentest Tools List
  15. Kik Hack Tools
  16. Underground Hacker Sites
  17. Hack And Tools
  18. Hack Tools Download
  19. Hack App
  20. Hacker Hardware Tools
  21. Hacking Tools For Kali Linux
  22. Pentest Recon Tools
  23. New Hack Tools
  24. Pentest Tools Open Source
  25. Pentest Box Tools Download
  26. Pentest Tools Review
  27. Hacking Tools For Windows
  28. Kik Hack Tools
  29. Pentest Tools Free
  30. Usb Pentest Tools
  31. Hacking Tools Mac
  32. Tools Used For Hacking
  33. Hacking Tools Name
  34. New Hack Tools
  35. Pentest Tools Linux
  36. Hacks And Tools
  37. Hacking Tools Windows
  38. Pentest Tools For Ubuntu
  39. Hack Tools For Pc
  40. Hacker Tools For Mac
  41. Hacking Tools For Windows
  42. Pentest Tools Free
  43. Hacker Tool Kit
  44. Nsa Hack Tools Download
  45. Hacking Tools Name
  46. Hacking Tools Mac
  47. Hacker Tools 2019
  48. Pentest Tools
  49. Computer Hacker
  50. What Are Hacking Tools
  51. Pentest Tools Framework
  52. Pentest Tools Download
  53. Hacking Tools Usb
  54. Blackhat Hacker Tools

No comments:

Post a Comment