{"id":2942,"date":"2021-06-04T16:17:32","date_gmt":"2021-06-04T09:47:32","guid":{"rendered":"https:\/\/iatmm.com\/?post_type=lp_course&#038;p=2942"},"modified":"2021-12-22T09:14:32","modified_gmt":"2021-12-22T02:44:32","slug":"penetration-testing-extreme-course","status":"publish","type":"lp_course","link":"https:\/\/iat.edu.mm\/courses\/cybersecurity\/penetration-testing-extreme-course\/","title":{"rendered":"Penetration Testing Extreme Course"},"content":{"rendered":"<p>Penetration Testing Extreme Course is a practical training course for students who prepare for eLearnSecurity Certified Penetration Tester eXtreme (eCPTX) Certification Exam. eCPTXv2 is the most advanced pentesting certification.<\/p>\n<p>The Penetration Testing Extreme Course will gain you skills in the following areas:<\/p>\n<ul>\n<li>Advanced penetration testing processes and methodologies<\/li>\n<li>Advanced Exploitation using Metasploit and Empire<\/li>\n<li>Network\/traffic manipulation<\/li>\n<li>Pivoting<\/li>\n<li>Advanced Lateral Movement (WMI, PS Remoting, DCOM, etc.)<\/li>\n<li>Advanced Active Directory Information Gathering, Enumeration and Reconnaissance<\/li>\n<li>Custom Attack Vector Development<\/li>\n<li>Deep knowledge of Active Directory and Windows internals<\/li>\n<li>Knowledge of Windows authentication weaknesses<\/li>\n<li>Web application Manual exploitation<\/li>\n<li>Stealthy Scanning and Profiling the target<\/li>\n<li>Advanced Persistence \/ Backdooring<\/li>\n<li>Privilege escalation<\/li>\n<\/ul>\n<p>Reference: <a href=\"https:\/\/elearnsecurity.com\/product\/ecptx-certification\/\">https:\/\/elearnsecurity.com\/product\/ecpptv2-certification\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Extreme Course is a practical training course for students who prepare for eLearnSecurity Certified Penetration Tester eXtreme (eCPTX) [&hellip;]<\/p>\n","protected":false},"featured_media":3987,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","course_category":[39],"course_tag":[],"class_list":["post-2942","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-cybersecurity","course"],"_links":{"self":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/lp_course\/2942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/types\/lp_course"}],"replies":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/comments?post=2942"}],"version-history":[{"count":1,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/lp_course\/2942\/revisions"}],"predecessor-version":[{"id":2946,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/lp_course\/2942\/revisions\/2946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media\/3987"}],"wp:attachment":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media?parent=2942"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/course_category?post=2942"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/course_tag?post=2942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}