ECPPTv2 - Penetration Testing Professional from the popular eLearnSecurity Institute and INE is advanced penetration testing training. Prerequisite for this course is completion of the eJPT course . The eCPPTv2 course is one of the most popular courses in penetration testing. This course is comparable to the SEC560 course from the SANS Institute. This course teaches network penetration testing, web penetration testing, WiFi penetration testing and wireless networks, as well as operating system penetration testing. In this course, you will gain a deep understanding of Buffer overflow and Shellcoding, Windows and Linux exploitation, Post Exploitation, Pillaging. In this course you will learn about Ruby and Powershell to carry out attacks as well as build custom Metasploit tool modules and use them to carry out attacks.
Course prerequisites
- Beginner knowledge in networking topics, protocols used on the Internet
- Beginner knowledge in penetration testing topics
- Ability to read and understand code
- Course specifications
- Course level: Intermediate
- Time: 66 hours and 16 minutes
- Includes: 83 videos | 30 labs | 118 slides
- Master: Fabrizio Siciliano
- ECPPTv2 Course Content - Penetration Testing Professional
- System Security
- Architecture Fundamentals
- Assembler Debuggers and Tool Arsenal
- Buffer Overflows
- Shellcoding
- Cryptography and Password Cracking
- Malware
- Network Security
- Information Gathering
- Scanning
- Enumeration
- Sniffing & MitM Attacks
- Exploitation
- Post Exploitation
- Anonymity
- Social Engineering
- PowerShell for Pentesters
- PowerShell Fundamentals
- Offensive PowerShell
- Linux Exploitation
- Information Gathering
- Exploitation over the Network
- Post Exploitation
- Web App Security
- Information Gathering
- Cross Site Scripting
- SQL Injections
- Other Common Web Attacks
- Wi-Fi Security
- Prerequisites
- Environment Setup
- Wireless Standards and Networks
- Discover Wi-Fi Networks
- Traffic Analysis
- Attacking Wi-Fi Networks
- Wi-Fi as Attack Vectors
- Metasploit & Ruby
- Installation and Fundamentals
- Control Structures
- Methods, Variables, and Scope
- Classes, Modules, and Exceptions
- Pentesters Prerequisites
- Input Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit
More info
- Hacking Tools For Beginners
- Ethical Hacker Tools
- Hacking Tools For Kali Linux
- Hacking Tools Mac
- Pentest Tools Subdomain
- Easy Hack Tools
- Hacking Tools Usb
- Hack Tools For Ubuntu
- Free Pentest Tools For Windows
- Nsa Hacker Tools
- Hacks And Tools
- Hacker Tools Software
- Hacker Tools
- Hacking Tools 2019
- Free Pentest Tools For Windows
- Github Hacking Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Website
- Tools 4 Hack
- Pentest Tools For Android
- Pentest Tools Download
- Hacking Tools For Windows 7
- Hacking Tools For Beginners
- Bluetooth Hacking Tools Kali
- Hacker Security Tools
- Hacking Tools For Pc
- Hacking Tools Name
- How To Hack
- Best Pentesting Tools 2018
- Hack Tools For Ubuntu
- Pentest Tools Apk
- Hacker Tools Apk Download
- Pentest Tools Framework
- Pentest Tools Download
- Pentest Tools For Android
- Underground Hacker Sites
- Pentest Recon Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Find Subdomains
- Android Hack Tools Github
- Easy Hack Tools
- Tools Used For Hacking
- Hack Rom Tools
- Hack Tools
- Hack Tools Mac
- Hacking Tools For Mac
- Hacker Security Tools
- New Hacker Tools
- Hacking Apps
- Hack Tools
- Hacker Tools
- Hacking Tools Name
- Hacker Tools Mac
- Kik Hack Tools
- Hacking Tools Download
- Hacker Tools Hardware
- Hack Tools For Windows
- Kik Hack Tools
- Hacker
- Pentest Tools Free
- Hacking Tools For Windows Free Download
- Physical Pentest Tools
- New Hacker Tools
- Hack Tools For Mac
- Underground Hacker Sites
- Pentest Tools Port Scanner
- Hacker Tools For Windows
- Hacking Tools Kit
- Pentest Tools Github
- Best Hacking Tools 2019
- Nsa Hack Tools Download
- Hacker Tools For Pc
- Pentest Tools Download
- Hacking Tools
- Black Hat Hacker Tools
- Hack Tools Pc
- Hackrf Tools
- Hacker Tool Kit
- Pentest Tools Kali Linux
- Hacking Tools For Windows
- Blackhat Hacker Tools
- Pentest Automation Tools
- Ethical Hacker Tools
- Hack Website Online Tool
- Nsa Hack Tools
- Pentest Tools Open Source
- Hacking Tools 2020
- Hacking Tools Github
- New Hacker Tools
- Pentest Tools Github
- Pentest Automation Tools
- Pentest Tools Subdomain
- Nsa Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Free Download
- Hacker Tools 2020
- Physical Pentest Tools
- Easy Hack Tools
- Pentest Tools Website
- Pentest Tools Framework
- Hacking Tools Software
- Hack Tools Online
- Hack Rom Tools
- Hack Tools For Games
- Pentest Tools Find Subdomains
- Hack Tools For Pc
- Termux Hacking Tools 2019
- Hacker Tools For Windows
- Hacker
- Hack Tools For Pc
- Hacking Tools Mac
- Pentest Tools Website Vulnerability
- Hack And Tools
- Hack Website Online Tool
- Pentest Tools Subdomain
- Hacking Tools 2019
- Hacker Tools For Pc
- Hacker Hardware Tools
- Hacking Tools Software
- Hacking App
- Underground Hacker Sites
- Hacker Tool Kit
- Hacking Tools For Windows Free Download
- Hack App
- Hacker Tools Online
- Hack Rom Tools
- Pentest Tools For Windows
- Best Pentesting Tools 2018
- Hacking Tools For Pc
- Pentest Tools Alternative
- Pentest Tools Open Source
- Hack Tools
- What Are Hacking Tools
- Hack Tools Mac
- Pentest Tools Open Source
- Pentest Tools Android
- Hack App
- Pentest Box Tools Download
- Hackrf Tools
- Hacker Tool Kit
- Pentest Tools For Ubuntu
- Hacking Tools Online
- Hacker Techniques Tools And Incident Handling
- New Hack Tools
- Pentest Tools For Ubuntu
- Hacking Apps
- Top Pentest Tools
- Hacking Tools And Software
- Pentest Reporting Tools
- Hacking Tools Pc