Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)
- 收录时间:2020-06-21 13:34:34
- 文件大小:6GB
- 下载次数:80
- 最近下载:2020-10-20 23:55:31
- 磁力链接:
-
文件列表
- 11.2.1 Understanding the Red Team Environment.mp4 625MB
- 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 453MB
- 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 315MB
- 14.3.1 Surveying Social Engineering Methodologies.mp4 231MB
- 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 223MB
- 37.7.2 Understanding Lateral Movement.mp4 217MB
- 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 212MB
- 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 211MB
- 21.4.4 Exploring How to Automate Scans.mp4 206MB
- 16.3.3 Exploiting Social Engineering Tools.mp4 192MB
- 06.1.4 Exploring How to Plan and Fund a Red Team.mp4 186MB
- 50.9.2 Exploring How to Test in the Cloud.mp4 182MB
- 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 179MB
- 28.5.2 Exploring Web App Testing Essential Tools.mp4 172MB
- 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 160MB
- 15.3.2 Understanding How to Target Employees.mp4 157MB
- 09.1.7 Understanding Red Team Collaboration.mp4 151MB
- 23.4.6 Exploring Vulnerability Scanners.mp4 149MB
- 45.8.6 Searching for Sensitive Data.mp4 142MB
- 08.1.6 Understanding How to Create and Hire the Red Team.mp4 137MB
- 12.2.2 Understanding Passive Recon.mp4 136MB
- 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 133MB
- 42.8.3 Understanding How to Compromise User Credentials.mp4 128MB
- 22.4.5 Using Shodan and Its API.mp4 106MB
- 46.8.7 Understanding Data Exfiltration Techniques.mp4 103MB
- 29.5.3 Understanding Enterprise Application Continuous Testing.mp4 95MB
- 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 92MB
- 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 80MB
- 41.8.2 Learning How to Achieve Domain Admin Access.mp4 79MB
- 47.8.8 Understanding How to Cover Your Tracks.mp4 78MB
- 36.7.1 Learning Privilege Escalation Methodologies.mp4 74MB
- 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 74MB
- 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 70MB
- 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 69MB
- 02.Learning objectives.mp4 67MB
- 38.7.3 Surveying Privilege Escalation Essential Tools.mp4 61MB
- 39.Learning objectives.mp4 55MB
- 43.8.4 Surveying Password Cracking & Reporting.mp4 48MB
- 24.4.7 Understanding Binary and Source Code Scanners.mp4 46MB
- 20.4.3 Understanding Scanning Tools.mp4 46MB
- 17.Learning objectives.mp4 40MB
- 27.5.1 Exploring How to Target Hosts.mp4 40MB
- 25.4.8 Understanding How to Perform Continuous Monitoring.mp4 39MB
- 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 36MB
- 35.Learning objectives.mp4 32MB
- 10.Learning objectives.mp4 31MB
- 26.Learning objectives.mp4 29MB
- 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 29MB
- 31.6.1 Understanding How to Initially Get on the Network.mp4 27MB
- 48.Learning objectives.mp4 26MB
- 51.Learning objectives.mp4 25MB
- 13.Learning objectives.mp4 24MB
- 30.Learning objectives.mp4 21MB
- 40.8.1 Understanding Persistent Access.mp4 16MB
- fkSJH.jpg 25KB
- info.txt 6KB