zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[Tutorialsplanet.NET] Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
magnet:?xt=urn:btih:b8d9e4fca041abd2178d85883a17fcfb060f2903&dn=[Tutorialsplanet.NET] Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
磁力链接详情
Hash值:
b8d9e4fca041abd2178d85883a17fcfb060f2903
点击数:
241
文件大小:
8.14 GB
文件数量:
79
创建日期:
2022-4-15 03:14
最后访问:
2024-12-27 21:26
访问标签:
Tutorialsplanet
NET
Udemy
-
CompTIA
Pentest
Ethical
Hacking
Course
&
Practice
Exam
文件列表详情
1. Introduction/1. Welcome to the course!.mp4 75.05 MB
1. Introduction/3. Exam Foundations.mp4 87.61 MB
2. Domain 1 Planning and Scoping/1. Planning and Scoping (Overview).mp4 26.22 MB
2. Domain 1 Planning and Scoping/10. Target Selection.mp4 101.78 MB
2. Domain 1 Planning and Scoping/11. Other Scoping Considerations.mp4 129.12 MB
2. Domain 1 Planning and Scoping/2. Penetration Testing Methodology.mp4 60.57 MB
2. Domain 1 Planning and Scoping/3. Planning a Penetration Test.mp4 152.9 MB
2. Domain 1 Planning and Scoping/4. Rules of Engagement.mp4 107.69 MB
2. Domain 1 Planning and Scoping/5. Legal Concepts.mp4 195.02 MB
2. Domain 1 Planning and Scoping/6. Testing Strategies.mp4 54.86 MB
2. Domain 1 Planning and Scoping/7. White Box Support Resources.mp4 119.24 MB
2. Domain 1 Planning and Scoping/8. Types of Assessments.mp4 106.17 MB
2. Domain 1 Planning and Scoping/9. Threat Actors.mp4 140.21 MB
3. Domain 2 Information Gathering and Vulnerability Identification/10. Open Source Research.mp4 115.38 MB
3. Domain 2 Information Gathering and Vulnerability Identification/11. Vulnerability Scanning.mp4 168.99 MB
3. Domain 2 Information Gathering and Vulnerability Identification/12. Scanning Considerations.mp4 104.52 MB
3. Domain 2 Information Gathering and Vulnerability Identification/13. Application and Container Scans.mp4 54.8 MB
3. Domain 2 Information Gathering and Vulnerability Identification/14. Analyzing Vulnerability Scans.mp4 136.74 MB
3. Domain 2 Information Gathering and Vulnerability Identification/15. Leverage Information for Exploit.mp4 63.73 MB
3. Domain 2 Information Gathering and Vulnerability Identification/16. Common Attack Vectors.mp4 121.96 MB
3. Domain 2 Information Gathering and Vulnerability Identification/17. Weaknesses in Specialized Systems.mp4 202.45 MB
3. Domain 2 Information Gathering and Vulnerability Identification/2. Information Gathering.mp4 189.14 MB
3. Domain 2 Information Gathering and Vulnerability Identification/3. Reconnaissance with CentralOps (Demo).mp4 120.54 MB
3. Domain 2 Information Gathering and Vulnerability Identification/4. Scanning and Enumeration.mp4 84.23 MB
3. Domain 2 Information Gathering and Vulnerability Identification/5. Fingerprinting.mp4 78.75 MB
3. Domain 2 Information Gathering and Vulnerability Identification/6. Scanning and Enumeration (Demo).mp4 177.94 MB
3. Domain 2 Information Gathering and Vulnerability Identification/7. Cryptographic Inspection.mp4 28.28 MB
3. Domain 2 Information Gathering and Vulnerability Identification/8. Eavesdropping.mp4 62.41 MB
3. Domain 2 Information Gathering and Vulnerability Identification/9. Decompiling and Debugging.mp4 50.83 MB
4. Domain 3 Attacks and Exploits/1. Attacks and Exploits (Overview).mp4 36.58 MB
4. Domain 3 Attacks and Exploits/10. Local Host Vulnerabilities.mp4 52.99 MB
4. Domain 3 Attacks and Exploits/11. Privilege Escalation (Linux).mp4 86.15 MB
4. Domain 3 Attacks and Exploits/12. Privilege Escalation (Windows).mp4 192.71 MB
4. Domain 3 Attacks and Exploits/13. Privilege Escalation.mp4 93.77 MB
4. Domain 3 Attacks and Exploits/14. Privilege Escalation (Demo).mp4 90.88 MB
4. Domain 3 Attacks and Exploits/15. Lateral Movement.mp4 163.68 MB
4. Domain 3 Attacks and Exploits/16. Persistence.mp4 125.04 MB
4. Domain 3 Attacks and Exploits/17. Covering Your Tracks.mp4 101.57 MB
4. Domain 3 Attacks and Exploits/18. Persistence and Covering Tracks (Demo).mp4 107.75 MB
4. Domain 3 Attacks and Exploits/2. Social Engineering.mp4 237.92 MB
4. Domain 3 Attacks and Exploits/3. Motivation Factors.mp4 138.5 MB
4. Domain 3 Attacks and Exploits/4. Physical Security Attacks.mp4 104.96 MB
4. Domain 3 Attacks and Exploits/5. Lock Picking (Demo).mp4 26.85 MB
4. Domain 3 Attacks and Exploits/6. Network-based Vulnerabilities.mp4 255.21 MB
4. Domain 3 Attacks and Exploits/7. Wireless-based Vulnerabilities.mp4 160.21 MB
4. Domain 3 Attacks and Exploits/8. Wireless Network Attack (Demo).mp4 77.3 MB
4. Domain 3 Attacks and Exploits/9. Application-based Vulnerabilities.mp4 324.38 MB
5. Domain 4 Penetration Testing Tools/1. Penetration Testing Tools (Overview).mp4 47.63 MB
5. Domain 4 Penetration Testing Tools/10. OSINT.mp4 93.21 MB
5. Domain 4 Penetration Testing Tools/11. Wireless.mp4 33.82 MB
5. Domain 4 Penetration Testing Tools/12. Web Proxies.mp4 105.91 MB
5. Domain 4 Penetration Testing Tools/13. Social Engineering Tools.mp4 23.04 MB
5. Domain 4 Penetration Testing Tools/14. Remote Access Tools.mp4 93.92 MB
5. Domain 4 Penetration Testing Tools/15. Networking Tools.mp4 31.17 MB
5. Domain 4 Penetration Testing Tools/16. Mobile Tools.mp4 41.25 MB
5. Domain 4 Penetration Testing Tools/17. Miscellaneous Tools.mp4 85.7 MB
5. Domain 4 Penetration Testing Tools/18. Intro to Programming.mp4 52.29 MB
5. Domain 4 Penetration Testing Tools/19. Programming Concepts.mp4 405.71 MB
5. Domain 4 Penetration Testing Tools/2. Nmap Usage.mp4 194.82 MB
5. Domain 4 Penetration Testing Tools/20. BASH Script Example.mp4 79.56 MB
5. Domain 4 Penetration Testing Tools/21. Python Script Example.mp4 60.99 MB
5. Domain 4 Penetration Testing Tools/22. PowerShell Script Example.mp4 56.66 MB
5. Domain 4 Penetration Testing Tools/23. Ruby Script Example.mp4 81.33 MB
5. Domain 4 Penetration Testing Tools/3. Nmap Usage (Demo).mp4 96.11 MB
5. Domain 4 Penetration Testing Tools/4. Use Cases for Tools.mp4 137.91 MB
5. Domain 4 Penetration Testing Tools/5. Scanners.mp4 41.02 MB
5. Domain 4 Penetration Testing Tools/6. Credential Testing Tools.mp4 121.24 MB
5. Domain 4 Penetration Testing Tools/7. Password Cracking (Demo).mp4 26.18 MB
5. Domain 4 Penetration Testing Tools/8. Debuggers.mp4 46.98 MB
5. Domain 4 Penetration Testing Tools/9. Software Assurance.mp4 42.06 MB
6. Domain 5 Reporting and Communication/1. Reporting and Communication (Overview).mp4 36.25 MB
6. Domain 5 Reporting and Communication/2. Pentest Communications.mp4 164.67 MB
6. Domain 5 Reporting and Communication/3. Report Writing.mp4 150.94 MB
6. Domain 5 Reporting and Communication/4. Mitigation Strategies.mp4 133.06 MB
6. Domain 5 Reporting and Communication/5. Post-Report Activities.mp4 85.57 MB
6. Domain 5 Reporting and Communication/6. Pentest Report Example.mp4 16.55 MB
7. Conclusion/1. Conclusion.mp4 38.26 MB
7. Conclusion/2. Creating Your Pentest Lab.mp4 154.55 MB
7. Conclusion/3. BONUS Where to go from here.mp4 59.85 MB
其他位置