589689.xyz

Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)

  • 收录时间:2020-06-21 13:34:34
  • 文件大小:6GB
  • 下载次数:80
  • 最近下载:2020-10-20 23:55:31
  • 磁力链接:

文件列表

  1. 11.2.1 Understanding the Red Team Environment.mp4 625MB
  2. 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 453MB
  3. 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 315MB
  4. 14.3.1 Surveying Social Engineering Methodologies.mp4 231MB
  5. 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 223MB
  6. 37.7.2 Understanding Lateral Movement.mp4 217MB
  7. 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 212MB
  8. 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 211MB
  9. 21.4.4 Exploring How to Automate Scans.mp4 206MB
  10. 16.3.3 Exploiting Social Engineering Tools.mp4 192MB
  11. 06.1.4 Exploring How to Plan and Fund a Red Team.mp4 186MB
  12. 50.9.2 Exploring How to Test in the Cloud.mp4 182MB
  13. 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 179MB
  14. 28.5.2 Exploring Web App Testing Essential Tools.mp4 172MB
  15. 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 160MB
  16. 15.3.2 Understanding How to Target Employees.mp4 157MB
  17. 09.1.7 Understanding Red Team Collaboration.mp4 151MB
  18. 23.4.6 Exploring Vulnerability Scanners.mp4 149MB
  19. 45.8.6 Searching for Sensitive Data.mp4 142MB
  20. 08.1.6 Understanding How to Create and Hire the Red Team.mp4 137MB
  21. 12.2.2 Understanding Passive Recon.mp4 136MB
  22. 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 133MB
  23. 42.8.3 Understanding How to Compromise User Credentials.mp4 128MB
  24. 22.4.5 Using Shodan and Its API.mp4 106MB
  25. 46.8.7 Understanding Data Exfiltration Techniques.mp4 103MB
  26. 29.5.3 Understanding Enterprise Application Continuous Testing.mp4 95MB
  27. 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 92MB
  28. 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 80MB
  29. 41.8.2 Learning How to Achieve Domain Admin Access.mp4 79MB
  30. 47.8.8 Understanding How to Cover Your Tracks.mp4 78MB
  31. 36.7.1 Learning Privilege Escalation Methodologies.mp4 74MB
  32. 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 74MB
  33. 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 70MB
  34. 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 69MB
  35. 02.Learning objectives.mp4 67MB
  36. 38.7.3 Surveying Privilege Escalation Essential Tools.mp4 61MB
  37. 39.Learning objectives.mp4 55MB
  38. 43.8.4 Surveying Password Cracking & Reporting.mp4 48MB
  39. 24.4.7 Understanding Binary and Source Code Scanners.mp4 46MB
  40. 20.4.3 Understanding Scanning Tools.mp4 46MB
  41. 17.Learning objectives.mp4 40MB
  42. 27.5.1 Exploring How to Target Hosts.mp4 40MB
  43. 25.4.8 Understanding How to Perform Continuous Monitoring.mp4 39MB
  44. 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 36MB
  45. 35.Learning objectives.mp4 32MB
  46. 10.Learning objectives.mp4 31MB
  47. 26.Learning objectives.mp4 29MB
  48. 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 29MB
  49. 31.6.1 Understanding How to Initially Get on the Network.mp4 27MB
  50. 48.Learning objectives.mp4 26MB
  51. 51.Learning objectives.mp4 25MB
  52. 13.Learning objectives.mp4 24MB
  53. 30.Learning objectives.mp4 21MB
  54. 40.8.1 Understanding Persistent Access.mp4 16MB
  55. fkSJH.jpg 25KB
  56. info.txt 6KB