OP 19 May, 2020 - 07:15 PM
Code:
Penetration Testing Professional
Section: System Security
Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware
Section: Network Security
Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering
Section: PowerShell for Pentesters
Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation
Section: Web Application Security
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks
Section: WiFi Security
Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector
Section: Ruby for Pentesters and Metasploit
Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit