ファイル | サイズ |
---|
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url | 377.00 B |
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url | 239.00 B |
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 | 43.77 MB |
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt | 9.66 kB |
1. Opening Lectures/2. Disclaimer.html | 1.62 kB |
1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html | 2.49 kB |
1. Opening Lectures/4. What can you do to get the most out of this course.mp4 | 36.17 MB |
1. Opening Lectures/4. What can you do to get the most out of this course.srt | 6.67 kB |
1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 | 35.83 MB |
1. Opening Lectures/5. How to get answers to your questions and help with problems.srt | 7.07 kB |
10. Happy Ending Lectures/1. How to go more advanced with this course.html | 3.00 kB |
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 | 16.37 MB |
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt | 2.92 kB |
10. Happy Ending Lectures/3. What's your next step after doing this course.html | 1.23 kB |
10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 | 5.38 MB |
10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt | 3.07 kB |
11. BONUS Section/1. Bonus Lecture.html | 2.10 kB |
2. Fundamentals/1. Lab Setup using the VMware Player.mp4 | 110.91 MB |
2. Fundamentals/1. Lab Setup using the VMware Player.srt | 17.65 kB |
2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html | 114.00 B |
2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html | 133.00 B |
2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html | 6.49 kB |
2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html | 1.98 kB |
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 | 184.25 MB |
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt | 37.26 kB |
3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 | 113.55 MB |
3. Information Gathering/1. Passive Reconnaissance - Part 1.srt | 14.98 kB |
3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 | 136.69 MB |
3. Information Gathering/2. Passive Reconnaissance - Part 2.srt | 15.97 kB |
3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 | 129.36 MB |
3. Information Gathering/3. Passive Reconnaissance - Part 3.srt | 14.66 kB |
3. Information Gathering/4. Store Passive Data in the Right Way.html | 3.96 kB |
3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 | 87.28 MB |
3. Information Gathering/5. Active Reconnaissance - Part 1.srt | 13.25 kB |
3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 | 118.52 MB |
3. Information Gathering/6. Active Reconnaissance - Part 2.srt | 17.40 kB |
3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 | 75.83 MB |
3. Information Gathering/7. Active Reconnaissance - Part 3.srt | 13.69 kB |
3. Information Gathering/8. Store Active Data in the Right Way.html | 662.00 B |
3. Information Gathering/8.1 Target DB.xlsx | 10.37 kB |
4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html | 995.00 B |
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 | 235.22 MB |
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt | 33.63 kB |
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 | 157.38 MB |
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt | 28.92 kB |
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 | 60.38 MB |
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt | 12.84 kB |
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 | 258.82 MB |
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt | 42.43 kB |
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 | 224.68 MB |
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt | 38.96 kB |
5. Exploitation/3. Essential Things You Should Know.html | 1.13 kB |
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 | 111.57 MB |
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt | 19.31 kB |
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 | 120.01 MB |
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt | 18.44 kB |
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 | 57.67 MB |
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt | 11.49 kB |
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 | 111.49 MB |
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt | 18.19 kB |
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 | 237.50 MB |
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt | 33.91 kB |
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 | 179.91 MB |
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt | 24.69 kB |
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 | 124.75 MB |
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt | 19.19 kB |
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 | 194.90 MB |
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt | 34.90 kB |
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 | 144.73 MB |
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt | 21.73 kB |
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 | 123.67 MB |
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt | 18.61 kB |
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 | 123.60 MB |
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt | 16.49 kB |
7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html | 1.52 kB |
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 | 55.40 MB |
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt | 9.96 kB |
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 | 167.20 MB |
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt | 19.93 kB |
7. Network PenTesting/13. Spawning Stable Shells.html | 2.28 kB |
7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 | 128.80 MB |
7. Network PenTesting/2. The Core of Network Testing - Part 1.srt | 21.53 kB |
7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 | 213.38 MB |
7. Network PenTesting/3. The Core of Network Testing - Part 2.srt | 23.19 kB |
7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 | 101.37 MB |
7. Network PenTesting/4. The Core of Network Testing - Part 3.srt | 14.15 kB |
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 | 114.00 MB |
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt | 17.61 kB |
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 | 81.21 MB |
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt | 15.17 kB |
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 | 79.27 MB |
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt | 13.92 kB |
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 | 158.31 MB |
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt | 22.73 kB |
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 | 142.74 MB |
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt | 22.31 kB |
8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html | 1.04 kB |
8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html | 3.10 kB |
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 | 65.21 MB |
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt | 14.39 kB |
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 | 221.42 MB |
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt | 27.50 kB |
9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4 | 141.06 MB |
9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt | 32.93 kB |
9. Writing Great Reports/2. Report Writing with Perfect Examples.html | 990.00 B |
9. Writing Great Reports/2.1 PenTest Report (OHU).docx | 973.79 kB |
9. Writing Great Reports/2.2 PenTest Report (OHU).pdf | 812.88 kB |
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url | 290.00 B |