589689.xyz

[] [UDEMY] CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam [FTU]

  • 收录时间:2019-03-15 10:06:49
  • 文件大小:8GB
  • 下载次数:176
  • 最近下载:2021-01-21 15:54:06
  • 磁力链接:

文件列表

  1. 05 Domain 4 Penetration Testing Tools/069 Programming Concepts.mp4 406MB
  2. 04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities.mp4 324MB
  3. 04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities.mp4 255MB
  4. 04 Domain 3 Attacks and Exploits/034 Social Engineering.mp4 238MB
  5. 03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems.mp4 202MB
  6. 02 Domain 1 Planning and Scoping/009 Legal Concepts.mp4 195MB
  7. 05 Domain 4 Penetration Testing Tools/052 Nmap Usage.mp4 195MB
  8. 04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows).mp4 193MB
  9. 03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering.mp4 189MB
  10. 03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo).mp4 178MB
  11. 03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning.mp4 169MB
  12. 06 Domain 5 Reporting and Communication/075 Pentest Communications.mp4 165MB
  13. 04 Domain 3 Attacks and Exploits/047 Lateral Movement.mp4 164MB
  14. 04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities.mp4 160MB
  15. 07 Conclusion/081 Creating Your Pentest Lab.mp4 155MB
  16. 02 Domain 1 Planning and Scoping/007 Planning a Penetration Test.mp4 153MB
  17. 06 Domain 5 Reporting and Communication/076 Report Writing.mp4 151MB
  18. 02 Domain 1 Planning and Scoping/013 Threat Actors.mp4 140MB
  19. 04 Domain 3 Attacks and Exploits/035 Motivation Factors.mp4 138MB
  20. 05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools.mp4 138MB
  21. 03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans.mp4 137MB
  22. 06 Domain 5 Reporting and Communication/077 Mitigation Strategies.mp4 133MB
  23. 02 Domain 1 Planning and Scoping/015 Other Scoping Considerations.mp4 129MB
  24. 04 Domain 3 Attacks and Exploits/048 Persistence.mp4 125MB
  25. 03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors.mp4 122MB
  26. 05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools.mp4 121MB
  27. 03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo).mp4 121MB
  28. 02 Domain 1 Planning and Scoping/011 White Box Support Resources.mp4 119MB
  29. 03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research.mp4 115MB
  30. 04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo).mp4 108MB
  31. 02 Domain 1 Planning and Scoping/008 Rules of Engagement.mp4 108MB
  32. 02 Domain 1 Planning and Scoping/012 Types of Assessments.mp4 106MB
  33. 05 Domain 4 Penetration Testing Tools/062 Web Proxies.mp4 106MB
  34. 04 Domain 3 Attacks and Exploits/036 Physical Security Attacks.mp4 105MB
  35. 03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations.mp4 105MB
  36. 02 Domain 1 Planning and Scoping/014 Target Selection.mp4 102MB
  37. 04 Domain 3 Attacks and Exploits/049 Covering Your Tracks.mp4 102MB
  38. 05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo).mp4 96MB
  39. 05 Domain 4 Penetration Testing Tools/064 Remote Access Tools.mp4 94MB
  40. 04 Domain 3 Attacks and Exploits/045 Privilege Escalation.mp4 94MB
  41. 05 Domain 4 Penetration Testing Tools/060 OSINT.mp4 93MB
  42. 04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo).mp4 91MB
  43. 01 Introduction/002 Exam Foundations.mp4 88MB
  44. 04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux).mp4 86MB
  45. 05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools.mp4 86MB
  46. 06 Domain 5 Reporting and Communication/078 Post-Report Activities.mp4 86MB
  47. 03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration.mp4 84MB
  48. 05 Domain 4 Penetration Testing Tools/073 Ruby Script Example.mp4 81MB
  49. 05 Domain 4 Penetration Testing Tools/070 BASH Script Example.mp4 80MB
  50. 03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting.mp4 79MB
  51. 04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo).mp4 77MB
  52. 01 Introduction/001 Welcome to the course.mp4 75MB
  53. 01 Introduction/004 How to Schedule Your Exam.mp4 70MB
  54. 03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit.mp4 64MB
  55. 03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping.mp4 62MB
  56. 05 Domain 4 Penetration Testing Tools/071 Python Script Example.mp4 61MB
  57. 02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology.mp4 61MB
  58. 05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example.mp4 57MB
  59. 02 Domain 1 Planning and Scoping/010 Testing Strategies.mp4 55MB
  60. 03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans.mp4 55MB
  61. 04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities.mp4 53MB
  62. 05 Domain 4 Penetration Testing Tools/068 Intro to Programming.mp4 52MB
  63. 03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging.mp4 51MB
  64. 03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview).mp4 48MB
  65. 05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview).mp4 48MB
  66. 05 Domain 4 Penetration Testing Tools/058 Debuggers.mp4 47MB
  67. 05 Domain 4 Penetration Testing Tools/059 Software Assurance.mp4 42MB
  68. 05 Domain 4 Penetration Testing Tools/066 Mobile Tools.mp4 41MB
  69. 05 Domain 4 Penetration Testing Tools/055 Scanners.mp4 41MB
  70. 07 Conclusion/080 Conclusion.mp4 38MB
  71. 04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview).mp4 37MB
  72. 06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview).mp4 36MB
  73. 05 Domain 4 Penetration Testing Tools/061 Wireless.mp4 34MB
  74. 05 Domain 4 Penetration Testing Tools/065 Networking Tools.mp4 31MB
  75. 03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection.mp4 28MB
  76. 04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo).mp4 27MB
  77. 02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview).mp4 26MB
  78. 05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo).mp4 26MB
  79. 05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools.mp4 23MB
  80. 01 Introduction/003 An Important Message About the Course.mp4 20MB
  81. 07 Conclusion/082 BONUS Congratulations on Completing the Course.mp4 17MB
  82. 06 Domain 5 Reporting and Communication/079 Pentest Report Example.mp4 17MB
  83. 07 Conclusion/082 Udemy-Coupon-Codes-Graduate.pdf 3MB
  84. 01 Introduction/001 CompTIA-Pentest-Study-Notes.pdf 2MB
  85. Discuss.FreeTutorials.Us.html 166KB
  86. FreeCoursesOnline.Me.html 108KB
  87. FreeTutorials.Eu.html 102KB
  88. 05 Domain 4 Penetration Testing Tools/069 Programming Concepts-en.srt 44KB
  89. 04 Domain 3 Attacks and Exploits/041 Application-based Vulnerabilities-en.srt 39KB
  90. 03 Domain 2 Information Gathering and Vulnerability Identification/021 Scanning and Enumeration (Demo)-en.srt 30KB
  91. 04 Domain 3 Attacks and Exploits/038 Network-based Vulnerabilities-en.srt 30KB
  92. 04 Domain 3 Attacks and Exploits/034 Social Engineering-en.srt 27KB
  93. 03 Domain 2 Information Gathering and Vulnerability Identification/018 Reconnaissance with CentralOps (Demo)-en.srt 26KB
  94. 05 Domain 4 Penetration Testing Tools/073 MS17-010-Exploit-700-lines-of-Ruby.txt 26KB
  95. 03 Domain 2 Information Gathering and Vulnerability Identification/017 Information Gathering-en.srt 24KB
  96. 03 Domain 2 Information Gathering and Vulnerability Identification/032 Weaknesses in Specialized Systems-en.srt 22KB
  97. 02 Domain 1 Planning and Scoping/009 Legal Concepts-en.srt 22KB
  98. 04 Domain 3 Attacks and Exploits/044 Privilege Escalation (Windows)-en.srt 21KB
  99. 05 Domain 4 Penetration Testing Tools/053 Nmap Usage (Demo)-en.srt 20KB
  100. 05 Domain 4 Penetration Testing Tools/052 Nmap Usage-en.srt 20KB
  101. 06 Domain 5 Reporting and Communication/075 Pentest Communications-en.srt 20KB
  102. 07 Conclusion/081 Creating Your Pentest Lab-en.srt 19KB
  103. 04 Domain 3 Attacks and Exploits/039 Wireless-based Vulnerabilities-en.srt 18KB
  104. 03 Domain 2 Information Gathering and Vulnerability Identification/026 Vulnerability Scanning-en.srt 18KB
  105. 06 Domain 5 Reporting and Communication/076 Report Writing-en.srt 18KB
  106. 05 Domain 4 Penetration Testing Tools/062 Web Proxies-en.srt 17KB
  107. 04 Domain 3 Attacks and Exploits/047 Lateral Movement-en.srt 17KB
  108. 02 Domain 1 Planning and Scoping/007 Planning a Penetration Test-en.srt 16KB
  109. 04 Domain 3 Attacks and Exploits/035 Motivation Factors-en.srt 16KB
  110. 06 Domain 5 Reporting and Communication/077 Mitigation Strategies-en.srt 16KB
  111. 02 Domain 1 Planning and Scoping/015 Other Scoping Considerations-en.srt 16KB
  112. 03 Domain 2 Information Gathering and Vulnerability Identification/029 Analyzing Vulnerability Scans-en.srt 15KB
  113. 02 Domain 1 Planning and Scoping/013 Threat Actors-en.srt 15KB
  114. 04 Domain 3 Attacks and Exploits/050 Persistence and Covering Tracks (Demo)-en.srt 15KB
  115. 05 Domain 4 Penetration Testing Tools/064 Remote Access Tools-en.srt 14KB
  116. 05 Domain 4 Penetration Testing Tools/054 Use Cases for Tools-en.srt 14KB
  117. 04 Domain 3 Attacks and Exploits/048 Persistence-en.srt 13KB
  118. 03 Domain 2 Information Gathering and Vulnerability Identification/031 Common Attack Vectors-en.srt 13KB
  119. 05 Domain 4 Penetration Testing Tools/056 Credential Testing Tools-en.srt 13KB
  120. 02 Domain 1 Planning and Scoping/008 Rules of Engagement-en.srt 13KB
  121. 04 Domain 3 Attacks and Exploits/036 Physical Security Attacks-en.srt 12KB
  122. 02 Domain 1 Planning and Scoping/012 Types of Assessments-en.srt 12KB
  123. 03 Domain 2 Information Gathering and Vulnerability Identification/025 Open Source Research-en.srt 12KB
  124. 03 Domain 2 Information Gathering and Vulnerability Identification/027 Scanning Considerations-en.srt 12KB
  125. 02 Domain 1 Planning and Scoping/011 White Box Support Resources-en.srt 12KB
  126. 04 Domain 3 Attacks and Exploits/049 Covering Your Tracks-en.srt 12KB
  127. 02 Domain 1 Planning and Scoping/014 Target Selection-en.srt 11KB
  128. 04 Domain 3 Attacks and Exploits/045 Privilege Escalation-en.srt 11KB
  129. 04 Domain 3 Attacks and Exploits/040 Wireless Network Attack (Demo)-en.srt 11KB
  130. 06 Domain 5 Reporting and Communication/078 Post-Report Activities-en.srt 10KB
  131. 05 Domain 4 Penetration Testing Tools/060 OSINT-en.srt 10KB
  132. 04 Domain 3 Attacks and Exploits/046 Privilege Escalation (Demo)-en.srt 9KB
  133. 05 Domain 4 Penetration Testing Tools/067 Miscellaneous Tools-en.srt 9KB
  134. 04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Linux)-en.srt 9KB
  135. 05 Domain 4 Penetration Testing Tools/072 PowerShell-Example-Enumerator.txt 9KB
  136. 05 Domain 4 Penetration Testing Tools/073 Ruby Script Example-en.srt 9KB
  137. 03 Domain 2 Information Gathering and Vulnerability Identification/019 Scanning and Enumeration-en.srt 8KB
  138. 01 Introduction/002 Exam Foundations-en.srt 8KB
  139. 05 Domain 4 Penetration Testing Tools/070 BASH Script Example-en.srt 8KB
  140. 03 Domain 2 Information Gathering and Vulnerability Identification/020 Fingerprinting-en.srt 8KB
  141. 01 Introduction/001 Welcome to the course-en.srt 8KB
  142. 05 Domain 4 Penetration Testing Tools/071 Python Script Example-en.srt 8KB
  143. 03 Domain 2 Information Gathering and Vulnerability Identification/023 Eavesdropping-en.srt 7KB
  144. 01 Introduction/004 How to Schedule Your Exam-en.srt 7KB
  145. 03 Domain 2 Information Gathering and Vulnerability Identification/030 Leverage Information for Exploit-en.srt 7KB
  146. 05 Domain 4 Penetration Testing Tools/072 PowerShell Script Example-en.srt 7KB
  147. 05 Domain 4 Penetration Testing Tools/068 Intro to Programming-en.srt 6KB
  148. 05 Domain 4 Penetration Testing Tools/051 Penetration Testing Tools (Overview)-en.srt 6KB
  149. 04 Domain 3 Attacks and Exploits/042 Local Host Vulnerabilities-en.srt 6KB
  150. 03 Domain 2 Information Gathering and Vulnerability Identification/028 Application and Container Scans-en.srt 6KB
  151. 02 Domain 1 Planning and Scoping/010 Testing Strategies-en.srt 6KB
  152. 03 Domain 2 Information Gathering and Vulnerability Identification/024 Decompiling and Debugging-en.srt 6KB
  153. 02 Domain 1 Planning and Scoping/006 Penetration Testing Methodology-en.srt 5KB
  154. 03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering and Vulnerability Identification (Overview)-en.srt 5KB
  155. 05 Domain 4 Penetration Testing Tools/058 Debuggers-en.srt 5KB
  156. 05 Domain 4 Penetration Testing Tools/059 Software Assurance-en.srt 4KB
  157. 05 Domain 4 Penetration Testing Tools/066 Mobile Tools-en.srt 4KB
  158. 04 Domain 3 Attacks and Exploits/033 Attacks and Exploits (Overview)-en.srt 4KB
  159. 05 Domain 4 Penetration Testing Tools/057 Password Cracking (Demo)-en.srt 4KB
  160. 06 Domain 5 Reporting and Communication/074 Reporting and Communication (Overview)-en.srt 4KB
  161. 05 Domain 4 Penetration Testing Tools/055 Scanners-en.srt 4KB
  162. 07 Conclusion/080 Conclusion-en.srt 4KB
  163. 05 Domain 4 Penetration Testing Tools/061 Wireless-en.srt 4KB
  164. 05 Domain 4 Penetration Testing Tools/065 Networking Tools-en.srt 3KB
  165. 04 Domain 3 Attacks and Exploits/037 Lock Picking (Demo)-en.srt 3KB
  166. 03 Domain 2 Information Gathering and Vulnerability Identification/022 Cryptographic Inspection-en.srt 3KB
  167. 05 Domain 4 Penetration Testing Tools/070 Bash-Example-Scan-with-Nmap.txt 3KB
  168. 05 Domain 4 Penetration Testing Tools/063 Social Engineering Tools-en.srt 3KB
  169. 02 Domain 1 Planning and Scoping/005 Planning and Scoping (Overview)-en.srt 3KB
  170. 01 Introduction/003 An Important Message About the Course-en.srt 2KB
  171. 05 Domain 4 Penetration Testing Tools/071 Python-Example-Public-IP.txt 2KB
  172. 06 Domain 5 Reporting and Communication/079 Pentest Report Example-en.srt 2KB
  173. 07 Conclusion/082 BONUS Congratulations on Completing the Course-en.srt 2KB
  174. 05 Domain 4 Penetration Testing Tools/073 Ruby-Example-Banner-Grabber.txt 773B
  175. [TGx]Downloaded from torrentgalaxy.org.txt 524B
  176. 06 Domain 5 Reporting and Communication/079 An-excellent-example-of-a-Penetration-Testing-report-external-link-to-SANS.org-website-.txt 480B
  177. 07 Conclusion/081 Click-here-to-download-the-Kali-Linux-virtual-machine.txt 415B
  178. 07 Conclusion/081 Click-here-to-download-the-Metasploitable2-virtual-machine.txt 415B
  179. 07 Conclusion/082 Risk-Management-for-Cybersecurity-and-IT-Managers.txt 385B
  180. 07 Conclusion/082 PRINCE2-Agile-Foundation-Get-certified-in-the-next-7-days-.txt 340B
  181. 07 Conclusion/082 ITIL-Foundation-Cram-to-Pass-the-ITIL-Exam-in-7-Days-.txt 335B
  182. 07 Conclusion/082 Anatomy-of-a-Cyber-Attack-Beginner-Hacking-with-Metasploit.txt 320B
  183. 07 Conclusion/082 ITIL-Foundation-Practice-Certification-Exams-6-Exams-.txt 315B
  184. 07 Conclusion/082 PRINCE2-Foundation-Practice-Certification-Exams-6-Exams-.txt 310B
  185. 07 Conclusion/082 CompTIA-Network-N10-007-5-Practice-Exams-Simulations.txt 305B
  186. 07 Conclusion/082 Introduction-to-Malware-Analysis-for-Incident-Responders.txt 300B
  187. 07 Conclusion/082 ITIL-Foundation-Complete-ITIL-Exam-Preparation-Course.txt 295B
  188. 07 Conclusion/082 WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners.txt 295B
  189. 07 Conclusion/082 CompTIA-CySA-CS0-001-Complete-Course-and-Practice-Exam.txt 290B
  190. 07 Conclusion/082 How-to-Pass-Certification-Exams-with-Strategic-Test-Taking-.txt 290B
  191. 07 Conclusion/082 Introduction-to-Cloud-Security-with-Microsoft-Azure.txt 285B
  192. 07 Conclusion/082 -UNOFFICIAL-Certified-Ethical-Hacker-CEH-Practice-Exams.txt 285B
  193. 07 Conclusion/082 PRINCE2-Foundation-Cram-to-Pass-the-PRINCE2-Exam-in-7-Days-.txt 280B
  194. 07 Conclusion/082 CompTIA-Network-Cert-N10-007-Full-Course-Practice-Exam.txt 275B
  195. 07 Conclusion/082 CompTIA-Pentest-PT0-001-Complete-Course-Practice-Exam.txt 275B
  196. 07 Conclusion/082 CompTIA-CySA-CS0-001-5-Practice-Certification-Exams.txt 270B
  197. How you can help Team-FTU.txt 259B
  198. Torrent Downloaded From GloDls.to.txt 84B