Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 7457

Penetration Testing Professional (PTP) Version 5 | elearnsecurity

by none786 - 12 April, 2020 - 12:59 PM
This post is by a banned member (sundara) - Unhide
sundara  
Registered
4
Posts
0
Threads
4 Years of service
#9
nice share! keep going
This post is by a banned member (meaculpa) - Unhide
meaculpa  
Registered
16
Posts
0
Threads
4 Years of service
#10
this will be great to work through, thank you for this. !!
This post is by a banned member (lionducap) - Unhide
lionducap  
Registered
11
Posts
0
Threads
4 Years of service
#11
nice dude
This post is by a banned member (T3RR4) - Unhide
T3RR4  
Registered
14
Posts
0
Threads
4 Years of service
#12
That's the official eCPT course aligned. Heart it.
This post is by a banned member (rodrigofraud) - Unhide
8
Posts
0
Threads
5 Years of service
#13
amazing think you man
This post is by a banned member (anrbn) - Unhide
anrbn  
Registered
11
Posts
0
Threads
4 Years of service
#14
Wow bro thats amazing!
This post is by a banned member (dropmeflag) - Unhide
3
Posts
0
Threads
4 Years of service
#15
(12 April, 2020 - 12:59 PM)none786 Wrote: Show More
[/b]
Penetration Testing Professional

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit


Download Link :

Thank you !
This post is by a banned member (sudokrypt) - Unhide
sudokrypt  
Registered
1
Posts
0
Threads
4 Years of service
#16
Thank you I was looking for it !!

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)