File | Dimensione |
---|
01 Introduction/001 CompTIA-Pentest-Study-Notes.pdf | 2.19 MB |
01 Introduction/001 Welcome to the course-en.srt | 7.83 kB |
01 Introduction/001 Welcome to the course.mp4 | 75.04 MB |
01 Introduction/002 Exam Foundations-en.srt | 8.30 kB |
01 Introduction/002 Exam Foundations.mp4 | 87.61 MB |
01 Introduction/003 An Important Message About the Course-en.srt | 2.46 kB |
01 Introduction/003 An Important Message About the Course.mp4 | 20.23 MB |
01 Introduction/004 How to Schedule Your Exam-en.srt | 7.11 kB |
01 Introduction/004 How to Schedule Your Exam.mp4 | 70.48 MB |
02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview)-en.srt | 2.59 kB |
02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview).mp4 | 26.22 MB |
02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology-en.srt | 5.46 kB |
02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology.mp4 | 60.57 MB |
02 Domain 1 Planning and Scoping/007 Planning a Penetration Test-en.srt | 16.19 kB |
02 Domain 1 Planning and Scoping/007 Planning a Penetration Test.mp4 | 152.90 MB |
02 Domain 1 Planning and Scoping/008 Rules of Engagement-en.srt | 12.54 kB |
02 Domain 1 Planning and Scoping/008 Rules of Engagement.mp4 | 107.68 MB |
02 Domain 1 Planning and Scoping/009 Legal Concepts-en.srt | 21.54 kB |
02 Domain 1 Planning and Scoping/009 Legal Concepts.mp4 | 195.02 MB |
02 Domain 1 Planning and Scoping/010 Testing Strategies-en.srt | 5.74 kB |
02 Domain 1 Planning and Scoping/010 Testing Strategies.mp4 | 54.86 MB |
02 Domain 1 Planning and Scoping/011 White Box Support Resources-en.srt | 11.77 kB |
02 Domain 1 Planning and Scoping/011 White Box Support Resources.mp4 | 119.23 MB |
02 Domain 1 Planning and Scoping/012 Types of Assessments-en.srt | 12.02 kB |
02 Domain 1 Planning and Scoping/012 Types of Assessments.mp4 | 106.16 MB |
02 Domain 1 Planning and Scoping/013 Threat Actors-en.srt | 15.04 kB |
02 Domain 1 Planning and Scoping/013 Threat Actors.mp4 | 140.21 MB |
02 Domain 1 Planning and Scoping/014 Target Selection-en.srt | 10.90 kB |
02 Domain 1 Planning and Scoping/014 Target Selection.mp4 | 101.78 MB |
02 Domain 1 Planning and Scoping/015 Other Scoping Considerations-en.srt | 15.82 kB |
02 Domain 1 Planning and Scoping/015 Other Scoping Considerations.mp4 | 129.12 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview)-en.srt | 5.25 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview).mp4 | 48.42 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering-en.srt | 23.67 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering.mp4 | 189.14 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo)-en.srt | 26.33 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo).mp4 | 120.53 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration-en.srt | 8.36 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration.mp4 | 84.22 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting-en.srt | 8.14 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting.mp4 | 78.74 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo)-en.srt | 30.12 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo).mp4 | 177.94 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection-en.srt | 2.86 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection.mp4 | 28.27 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping-en.srt | 7.16 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping.mp4 | 62.40 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging-en.srt | 5.71 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging.mp4 | 50.83 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research-en.srt | 11.94 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research.mp4 | 115.38 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning-en.srt | 18.38 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning.mp4 | 168.98 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations-en.srt | 11.79 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations.mp4 | 104.51 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans-en.srt | 5.81 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans.mp4 | 54.79 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans-en.srt | 15.24 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans.mp4 | 136.73 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit-en.srt | 6.85 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit.mp4 | 63.72 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors-en.srt | 13.10 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors.mp4 | 121.95 MB |
03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems-en.srt | 22.18 kB |
03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems.mp4 | 202.45 MB |
04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview)-en.srt | 4.10 kB |
04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview).mp4 | 36.57 MB |
04 Domain 3 Attacks and Exploits/034 Social Engineering-en.srt | 27.21 kB |
04 Domain 3 Attacks and Exploits/034 Social Engineering.mp4 | 237.92 MB |
04 Domain 3 Attacks and Exploits/035 Motivation Factors-en.srt | 15.95 kB |
04 Domain 3 Attacks and Exploits/035 Motivation Factors.mp4 | 138.49 MB |
04 Domain 3 Attacks and Exploits/036 Physical Security Attacks-en.srt | 12.48 kB |
04 Domain 3 Attacks and Exploits/036 Physical Security Attacks.mp4 | 104.95 MB |
04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo)-en.srt | 2.87 kB |
04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo).mp4 | 26.85 MB |
04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities-en.srt | 30.11 kB |
04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities.mp4 | 255.20 MB |
04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities-en.srt | 18.39 kB |
04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities.mp4 | 160.20 MB |
04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo)-en.srt | 10.61 kB |
04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo).mp4 | 77.29 MB |
04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities-en.srt | 39.35 kB |
04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities.mp4 | 324.37 MB |
04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities-en.srt | 6.12 kB |
04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities.mp4 | 52.98 MB |
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux)-en.srt | 9.11 kB |
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux).mp4 | 86.14 MB |
04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows)-en.srt | 20.60 kB |
04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows).mp4 | 192.71 MB |
04 Domain 3 Attacks and Exploits/045 Privilege Escalation-en.srt | 10.79 kB |
04 Domain 3 Attacks and Exploits/045 Privilege Escalation.mp4 | 93.77 MB |
04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo)-en.srt | 9.32 kB |
04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo).mp4 | 90.88 MB |
04 Domain 3 Attacks and Exploits/047 Lateral Movement-en.srt | 16.80 kB |
04 Domain 3 Attacks and Exploits/047 Lateral Movement.mp4 | 163.68 MB |
04 Domain 3 Attacks and Exploits/048 Persistence-en.srt | 13.19 kB |
04 Domain 3 Attacks and Exploits/048 Persistence.mp4 | 125.03 MB |
04 Domain 3 Attacks and Exploits/049 Covering Your Tracks-en.srt | 11.61 kB |
04 Domain 3 Attacks and Exploits/049 Covering Your Tracks.mp4 | 101.56 MB |
04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo)-en.srt | 14.86 kB |
04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo).mp4 | 107.75 MB |
05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview)-en.srt | 6.42 kB |
05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview).mp4 | 47.63 MB |
05 Domain 4 Penetration Testing Tools/052 Nmap Usage-en.srt | 20.17 kB |
05 Domain 4 Penetration Testing Tools/052 Nmap Usage.mp4 | 194.82 MB |
05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo)-en.srt | 20.47 kB |
05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo).mp4 | 96.10 MB |
05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools-en.srt | 13.54 kB |
05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools.mp4 | 137.91 MB |
05 Domain 4 Penetration Testing Tools/055 Scanners-en.srt | 3.87 kB |
05 Domain 4 Penetration Testing Tools/055 Scanners.mp4 | 41.02 MB |
05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools-en.srt | 12.95 kB |
05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools.mp4 | 121.23 MB |
05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo)-en.srt | 4.10 kB |
05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo).mp4 | 26.18 MB |
05 Domain 4 Penetration Testing Tools/058 Debuggers-en.srt | 5.08 kB |
05 Domain 4 Penetration Testing Tools/058 Debuggers.mp4 | 46.97 MB |
05 Domain 4 Penetration Testing Tools/059 Software Assurance-en.srt | 4.18 kB |
05 Domain 4 Penetration Testing Tools/059 Software Assurance.mp4 | 42.05 MB |
05 Domain 4 Penetration Testing Tools/060 OSINT-en.srt | 9.67 kB |
05 Domain 4 Penetration Testing Tools/060 OSINT.mp4 | 93.20 MB |
05 Domain 4 Penetration Testing Tools/061 Wireless-en.srt | 3.62 kB |
05 Domain 4 Penetration Testing Tools/061 Wireless.mp4 | 33.82 MB |
05 Domain 4 Penetration Testing Tools/062 Web Proxies-en.srt | 17.12 kB |
05 Domain 4 Penetration Testing Tools/062 Web Proxies.mp4 | 105.91 MB |
05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools-en.srt | 2.63 kB |
05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools.mp4 | 23.04 MB |
05 Domain 4 Penetration Testing Tools/064 Remote Access Tools-en.srt | 14.04 kB |
05 Domain 4 Penetration Testing Tools/064 Remote Access Tools.mp4 | 93.92 MB |
05 Domain 4 Penetration Testing Tools/065 Networking Tools-en.srt | 3.34 kB |
05 Domain 4 Penetration Testing Tools/065 Networking Tools.mp4 | 31.17 MB |
05 Domain 4 Penetration Testing Tools/066 Mobile Tools-en.srt | 4.10 kB |
05 Domain 4 Penetration Testing Tools/066 Mobile Tools.mp4 | 41.25 MB |
05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools-en.srt | 9.29 kB |
05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools.mp4 | 85.70 MB |
05 Domain 4 Penetration Testing Tools/068 Intro to Programming-en.srt | 6.50 kB |
05 Domain 4 Penetration Testing Tools/068 Intro to Programming.mp4 | 52.29 MB |
05 Domain 4 Penetration Testing Tools/069 Programming Concepts-en.srt | 43.65 kB |
05 Domain 4 Penetration Testing Tools/069 Programming Concepts.mp4 | 405.71 MB |
05 Domain 4 Penetration Testing Tools/070 BASH Script Example-en.srt | 8.20 kB |
05 Domain 4 Penetration Testing Tools/070 BASH Script Example.mp4 | 79.56 MB |
05 Domain 4 Penetration Testing Tools/070 Bash-Example-Scan-with-Nmap.txt | 2.79 kB |
05 Domain 4 Penetration Testing Tools/071 Python Script Example-en.srt | 7.80 kB |
05 Domain 4 Penetration Testing Tools/071 Python Script Example.mp4 | 60.99 MB |
05 Domain 4 Penetration Testing Tools/071 Python-Example-Public-IP.txt | 2.37 kB |
05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example-en.srt | 6.76 kB |
05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example.mp4 | 56.66 MB |
05 Domain 4 Penetration Testing Tools/072 PowerShell-Example-Enumerator.txt | 8.69 kB |
05 Domain 4 Penetration Testing Tools/073 MS17-010-Exploit-700-lines-of-Ruby.txt | 25.82 kB |
05 Domain 4 Penetration Testing Tools/073 Ruby Script Example-en.srt | 8.58 kB |
05 Domain 4 Penetration Testing Tools/073 Ruby Script Example.mp4 | 81.33 MB |
05 Domain 4 Penetration Testing Tools/073 Ruby-Example-Banner-Grabber.txt | 773.00 B |
06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview)-en.srt | 4.02 kB |
06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview).mp4 | 36.25 MB |
06 Domain 5 Reporting and Communication/075 Pentest Communications-en.srt | 19.92 kB |
06 Domain 5 Reporting and Communication/075 Pentest Communications.mp4 | 164.67 MB |
06 Domain 5 Reporting and Communication/076 Report Writing-en.srt | 18.05 kB |
06 Domain 5 Reporting and Communication/076 Report Writing.mp4 | 150.94 MB |
06 Domain 5 Reporting and Communication/077 Mitigation Strategies-en.srt | 15.87 kB |
06 Domain 5 Reporting and Communication/077 Mitigation Strategies.mp4 | 133.05 MB |
06 Domain 5 Reporting and Communication/078 Post-Report Activities-en.srt | 9.69 kB |
06 Domain 5 Reporting and Communication/078 Post-Report Activities.mp4 | 85.57 MB |
06 Domain 5 Reporting and Communication/079 An-excellent-example-of-a-Penetration-Testing-report-external-link-to-SANS.org-website-.txt | 480.00 B |
06 Domain 5 Reporting and Communication/079 Pentest Report Example-en.srt | 1.79 kB |
06 Domain 5 Reporting and Communication/079 Pentest Report Example.mp4 | 16.55 MB |
07 Conclusion/080 Conclusion-en.srt | 3.63 kB |
07 Conclusion/080 Conclusion.mp4 | 38.26 MB |
07 Conclusion/081 Click-here-to-download-the-Kali-Linux-virtual-machine.txt | 415.00 B |
07 Conclusion/081 Click-here-to-download-the-Metasploitable2-virtual-machine.txt | 415.00 B |
07 Conclusion/081 Creating Your Pentest Lab-en.srt | 18.94 kB |
07 Conclusion/081 Creating Your Pentest Lab.mp4 | 154.54 MB |
07 Conclusion/082 -UNOFFICIAL-Certified-Ethical-Hacker-CEH-Practice-Exams.txt | 285.00 B |
07 Conclusion/082 Anatomy-of-a-Cyber-Attack-Beginner-Hacking-with-Metasploit.txt | 320.00 B |
07 Conclusion/082 BONUS Congratulations on Completing the Course-en.srt | 1.59 kB |
07 Conclusion/082 BONUS Congratulations on Completing the Course.mp4 | 16.66 MB |
07 Conclusion/082 CompTIA-CySA-CS0-001-5-Practice-Certification-Exams.txt | 270.00 B |
07 Conclusion/082 CompTIA-CySA-CS0-001-Complete-Course-and-Practice-Exam.txt | 290.00 B |
07 Conclusion/082 CompTIA-Network-Cert-N10-007-Full-Course-Practice-Exam.txt | 275.00 B |
07 Conclusion/082 CompTIA-Network-N10-007-5-Practice-Exams-Simulations.txt | 305.00 B |
07 Conclusion/082 CompTIA-Pentest-PT0-001-Complete-Course-Practice-Exam.txt | 275.00 B |
07 Conclusion/082 How-to-Pass-Certification-Exams-with-Strategic-Test-Taking-.txt | 290.00 B |
07 Conclusion/082 Introduction-to-Cloud-Security-with-Microsoft-Azure.txt | 285.00 B |
07 Conclusion/082 Introduction-to-Malware-Analysis-for-Incident-Responders.txt | 300.00 B |
07 Conclusion/082 ITIL-Foundation-Complete-ITIL-Exam-Preparation-Course.txt | 295.00 B |
07 Conclusion/082 ITIL-Foundation-Cram-to-Pass-the-ITIL-Exam-in-7-Days-.txt | 335.00 B |
07 Conclusion/082 ITIL-Foundation-Practice-Certification-Exams-6-Exams-.txt | 315.00 B |
07 Conclusion/082 PRINCE2-Agile-Foundation-Get-certified-in-the-next-7-days-.txt | 340.00 B |
07 Conclusion/082 PRINCE2-Foundation-Cram-to-Pass-the-PRINCE2-Exam-in-7-Days-.txt | 280.00 B |
07 Conclusion/082 PRINCE2-Foundation-Practice-Certification-Exams-6-Exams-.txt | 310.00 B |
07 Conclusion/082 Risk-Management-for-Cybersecurity-and-IT-Managers.txt | 385.00 B |
07 Conclusion/082 Udemy-Coupon-Codes-Graduate.pdf | 2.75 MB |
07 Conclusion/082 WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners.txt | 295.00 B |
Discuss.FreeTutorials.Us.html | 165.68 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |