589689.xyz

[] Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam

  • 收录时间:2020-05-31 19:25:40
  • 文件大小:9GB
  • 下载次数:21
  • 最近下载:2021-01-09 07:48:02
  • 磁力链接:

文件列表

  1. 5. Domain 4 Penetration Testing Tools/19. Programming Concepts.mp4 406MB
  2. 4. Domain 3 Attacks and Exploits/9. Application-based Vulnerabilities.mp4 324MB
  3. 4. Domain 3 Attacks and Exploits/6. Network-based Vulnerabilities.mp4 255MB
  4. 4. Domain 3 Attacks and Exploits/2. Social Engineering.mp4 238MB
  5. 3. Domain 2 Information Gathering and Vulnerability Identification/17. Weaknesses in Specialized Systems.mp4 202MB
  6. 2. Domain 1 Planning and Scoping/5. Legal Concepts.mp4 195MB
  7. 5. Domain 4 Penetration Testing Tools/2. Nmap Usage.mp4 195MB
  8. 4. Domain 3 Attacks and Exploits/12. Privilege Escalation (Windows).mp4 193MB
  9. 3. Domain 2 Information Gathering and Vulnerability Identification/2. Information Gathering.srt 189MB
  10. 3. Domain 2 Information Gathering and Vulnerability Identification/2. Information Gathering.mp4 189MB
  11. 3. Domain 2 Information Gathering and Vulnerability Identification/6. Scanning and Enumeration (Demo).mp4 178MB
  12. 3. Domain 2 Information Gathering and Vulnerability Identification/11. Vulnerability Scanning.mp4 169MB
  13. 6. Domain 5 Reporting and Communication/2. Pentest Communications.srt 165MB
  14. 6. Domain 5 Reporting and Communication/2. Pentest Communications.mp4 165MB
  15. 4. Domain 3 Attacks and Exploits/15. Lateral Movement.mp4 164MB
  16. 4. Domain 3 Attacks and Exploits/7. Wireless-based Vulnerabilities.mp4 160MB
  17. 7. Conclusion/2. Creating Your Pentest Lab.mp4 155MB
  18. 2. Domain 1 Planning and Scoping/3. Planning a Penetration Test.mp4 153MB
  19. 6. Domain 5 Reporting and Communication/3. Report Writing.mp4 151MB
  20. 6. Domain 5 Reporting and Communication/3. Report Writing.srt 148MB
  21. 2. Domain 1 Planning and Scoping/9. Threat Actors.mp4 140MB
  22. 4. Domain 3 Attacks and Exploits/3. Motivation Factors.srt 139MB
  23. 4. Domain 3 Attacks and Exploits/3. Motivation Factors.mp4 139MB
  24. 5. Domain 4 Penetration Testing Tools/4. Use Cases for Tools.mp4 138MB
  25. 3. Domain 2 Information Gathering and Vulnerability Identification/14. Analyzing Vulnerability Scans.mp4 137MB
  26. 6. Domain 5 Reporting and Communication/4. Mitigation Strategies.mp4 133MB
  27. 2. Domain 1 Planning and Scoping/9. Threat Actors.srt 130MB
  28. 2. Domain 1 Planning and Scoping/11. Other Scoping Considerations.mp4 129MB
  29. 4. Domain 3 Attacks and Exploits/16. Persistence.mp4 125MB
  30. 3. Domain 2 Information Gathering and Vulnerability Identification/16. Common Attack Vectors.mp4 122MB
  31. 5. Domain 4 Penetration Testing Tools/6. Credential Testing Tools.mp4 121MB
  32. 3. Domain 2 Information Gathering and Vulnerability Identification/3. Reconnaissance with CentralOps (Demo).mp4 121MB
  33. 2. Domain 1 Planning and Scoping/7. White Box Support Resources.mp4 119MB
  34. 3. Domain 2 Information Gathering and Vulnerability Identification/10. Open Source Research.srt 115MB
  35. 3. Domain 2 Information Gathering and Vulnerability Identification/10. Open Source Research.mp4 115MB
  36. 4. Domain 3 Attacks and Exploits/18. Persistence and Covering Tracks (Demo).mp4 108MB
  37. 2. Domain 1 Planning and Scoping/4. Rules of Engagement.mp4 108MB
  38. 2. Domain 1 Planning and Scoping/8. Types of Assessments.mp4 106MB
  39. 5. Domain 4 Penetration Testing Tools/12. Web Proxies.mp4 106MB
  40. 4. Domain 3 Attacks and Exploits/4. Physical Security Attacks.mp4 105MB
  41. 3. Domain 2 Information Gathering and Vulnerability Identification/12. Scanning Considerations.mp4 105MB
  42. 2. Domain 1 Planning and Scoping/10. Target Selection.mp4 102MB
  43. 4. Domain 3 Attacks and Exploits/17. Covering Your Tracks.srt 102MB
  44. 4. Domain 3 Attacks and Exploits/17. Covering Your Tracks.mp4 102MB
  45. 5. Domain 4 Penetration Testing Tools/3. Nmap Usage (Demo).mp4 96MB
  46. 5. Domain 4 Penetration Testing Tools/14. Remote Access Tools.mp4 94MB
  47. 4. Domain 3 Attacks and Exploits/13. Privilege Escalation.srt 94MB
  48. 4. Domain 3 Attacks and Exploits/13. Privilege Escalation.mp4 94MB
  49. 5. Domain 4 Penetration Testing Tools/10. OSINT.mp4 93MB
  50. 4. Domain 3 Attacks and Exploits/14. Privilege Escalation (Demo).mp4 91MB
  51. 1. Introduction/3. Exam Foundations.mp4 88MB
  52. 4. Domain 3 Attacks and Exploits/11. Privilege Escalation (Linux).mp4 86MB
  53. 5. Domain 4 Penetration Testing Tools/17. Miscellaneous Tools.mp4 86MB
  54. 6. Domain 5 Reporting and Communication/5. Post-Report Activities.mp4 86MB
  55. 3. Domain 2 Information Gathering and Vulnerability Identification/4. Scanning and Enumeration.mp4 84MB
  56. 5. Domain 4 Penetration Testing Tools/23. Ruby Script Example.mp4 81MB
  57. 5. Domain 4 Penetration Testing Tools/20. BASH Script Example.mp4 80MB
  58. 5. Domain 4 Penetration Testing Tools/20. BASH Script Example.srt 79MB
  59. 3. Domain 2 Information Gathering and Vulnerability Identification/5. Fingerprinting.mp4 79MB
  60. 4. Domain 3 Attacks and Exploits/8. Wireless Network Attack (Demo).mp4 77MB
  61. 1. Introduction/1. Welcome to the course!.srt 75MB
  62. 1. Introduction/1. Welcome to the course!.mp4 75MB
  63. 3. Domain 2 Information Gathering and Vulnerability Identification/15. Leverage Information for Exploit.mp4 64MB
  64. 3. Domain 2 Information Gathering and Vulnerability Identification/8. Eavesdropping.mp4 62MB
  65. 5. Domain 4 Penetration Testing Tools/21. Python Script Example.mp4 61MB
  66. 2. Domain 1 Planning and Scoping/2. Penetration Testing Methodology.mp4 61MB
  67. 7. Conclusion/3. BONUS Where to go from here.mp4 60MB
  68. 5. Domain 4 Penetration Testing Tools/22. PowerShell Script Example.mp4 57MB
  69. 2. Domain 1 Planning and Scoping/6. Testing Strategies.mp4 55MB
  70. 3. Domain 2 Information Gathering and Vulnerability Identification/13. Application and Container Scans.mp4 55MB
  71. 4. Domain 3 Attacks and Exploits/10. Local Host Vulnerabilities.mp4 53MB
  72. 5. Domain 4 Penetration Testing Tools/18. Intro to Programming.mp4 52MB
  73. 3. Domain 2 Information Gathering and Vulnerability Identification/9. Decompiling and Debugging.mp4 51MB
  74. 5. Domain 4 Penetration Testing Tools/1. Penetration Testing Tools (Overview).mp4 48MB
  75. 5. Domain 4 Penetration Testing Tools/8. Debuggers.mp4 47MB
  76. 5. Domain 4 Penetration Testing Tools/9. Software Assurance.mp4 42MB
  77. 5. Domain 4 Penetration Testing Tools/16. Mobile Tools.mp4 41MB
  78. 5. Domain 4 Penetration Testing Tools/5. Scanners.mp4 41MB
  79. 2. Domain 1 Planning and Scoping/2. Penetration Testing Methodology.srt 40MB
  80. 7. Conclusion/1. Conclusion.mp4 38MB
  81. 4. Domain 3 Attacks and Exploits/1. Attacks and Exploits (Overview).mp4 37MB
  82. 6. Domain 5 Reporting and Communication/1. Reporting and Communication (Overview).mp4 36MB
  83. 5. Domain 4 Penetration Testing Tools/11. Wireless.mp4 34MB
  84. 5. Domain 4 Penetration Testing Tools/15. Networking Tools.mp4 31MB
  85. 3. Domain 2 Information Gathering and Vulnerability Identification/7. Cryptographic Inspection.mp4 28MB
  86. 4. Domain 3 Attacks and Exploits/5. Lock Picking (Demo).mp4 27MB
  87. 2. Domain 1 Planning and Scoping/1. Planning and Scoping (Overview).mp4 26MB
  88. 5. Domain 4 Penetration Testing Tools/7. Password Cracking (Demo).mp4 26MB
  89. 5. Domain 4 Penetration Testing Tools/13. Social Engineering Tools.mp4 23MB
  90. 6. Domain 5 Reporting and Communication/6. Pentest Report Example.mp4 17MB
  91. 1. Introduction/2.1 CompTIA-Pentest-Study-Notes.pdf 2MB
  92. 5. Domain 4 Penetration Testing Tools/19. Programming Concepts.srt 48KB
  93. 4. Domain 3 Attacks and Exploits/9. Application-based Vulnerabilities.srt 44KB
  94. 4. Domain 3 Attacks and Exploits/6. Network-based Vulnerabilities.srt 34KB
  95. 3. Domain 2 Information Gathering and Vulnerability Identification/6. Scanning and Enumeration (Demo).srt 33KB
  96. 4. Domain 3 Attacks and Exploits/2. Social Engineering.srt 30KB
  97. 3. Domain 2 Information Gathering and Vulnerability Identification/3. Reconnaissance with CentralOps (Demo).srt 29KB
  98. 5. Domain 4 Penetration Testing Tools/23.2 MS17-010 Exploit (700 lines of Ruby).txt 26KB
  99. 3. Domain 2 Information Gathering and Vulnerability Identification/17. Weaknesses in Specialized Systems.srt 25KB
  100. 2. Domain 1 Planning and Scoping/5. Legal Concepts.srt 24KB
  101. 4. Domain 3 Attacks and Exploits/12. Privilege Escalation (Windows).srt 23KB
  102. 5. Domain 4 Penetration Testing Tools/3. Nmap Usage (Demo).srt 23KB
  103. 5. Domain 4 Penetration Testing Tools/2. Nmap Usage.srt 23KB
  104. 7. Conclusion/2. Creating Your Pentest Lab.srt 21KB
  105. 4. Domain 3 Attacks and Exploits/7. Wireless-based Vulnerabilities.srt 20KB
  106. 3. Domain 2 Information Gathering and Vulnerability Identification/11. Vulnerability Scanning.srt 20KB
  107. 5. Domain 4 Penetration Testing Tools/12. Web Proxies.srt 19KB
  108. 4. Domain 3 Attacks and Exploits/15. Lateral Movement.srt 19KB
  109. 2. Domain 1 Planning and Scoping/3. Planning a Penetration Test.srt 18KB
  110. 2. Domain 1 Planning and Scoping/11. Other Scoping Considerations.srt 18KB
  111. 6. Domain 5 Reporting and Communication/4. Mitigation Strategies.srt 17KB
  112. 3. Domain 2 Information Gathering and Vulnerability Identification/14. Analyzing Vulnerability Scans.srt 17KB
  113. 4. Domain 3 Attacks and Exploits/18. Persistence and Covering Tracks (Demo).srt 16KB
  114. 5. Domain 4 Penetration Testing Tools/14. Remote Access Tools.srt 15KB
  115. 5. Domain 4 Penetration Testing Tools/4. Use Cases for Tools.srt 15KB
  116. 4. Domain 3 Attacks and Exploits/16. Persistence.srt 15KB
  117. 3. Domain 2 Information Gathering and Vulnerability Identification/16. Common Attack Vectors.srt 14KB
  118. 5. Domain 4 Penetration Testing Tools/6. Credential Testing Tools.srt 14KB
  119. 2. Domain 1 Planning and Scoping/4. Rules of Engagement.srt 14KB
  120. 4. Domain 3 Attacks and Exploits/4. Physical Security Attacks.srt 14KB
  121. 3. Domain 2 Information Gathering and Vulnerability Identification/12. Scanning Considerations.srt 13KB
  122. 2. Domain 1 Planning and Scoping/7. White Box Support Resources.srt 13KB
  123. 2. Domain 1 Planning and Scoping/8. Types of Assessments.srt 13KB
  124. 4. Domain 3 Attacks and Exploits/8. Wireless Network Attack (Demo).srt 12KB
  125. 2. Domain 1 Planning and Scoping/10. Target Selection.srt 12KB
  126. 6. Domain 5 Reporting and Communication/5. Post-Report Activities.srt 11KB
  127. 5. Domain 4 Penetration Testing Tools/10. OSINT.srt 11KB
  128. 4. Domain 3 Attacks and Exploits/14. Privilege Escalation (Demo).srt 10KB
  129. 5. Domain 4 Penetration Testing Tools/17. Miscellaneous Tools.srt 10KB
  130. 4. Domain 3 Attacks and Exploits/11. Privilege Escalation (Linux).srt 10KB
  131. 5. Domain 4 Penetration Testing Tools/23. Ruby Script Example.srt 9KB
  132. 3. Domain 2 Information Gathering and Vulnerability Identification/4. Scanning and Enumeration.srt 9KB
  133. 1. Introduction/3. Exam Foundations.srt 9KB
  134. 3. Domain 2 Information Gathering and Vulnerability Identification/5. Fingerprinting.srt 9KB
  135. 5. Domain 4 Penetration Testing Tools/22.1 PowerShell Example (Enumerator).txt 9KB
  136. 5. Domain 4 Penetration Testing Tools/21. Python Script Example.srt 9KB
  137. 3. Domain 2 Information Gathering and Vulnerability Identification/8. Eavesdropping.srt 8KB
  138. 3. Domain 2 Information Gathering and Vulnerability Identification/15. Leverage Information for Exploit.srt 8KB
  139. 5. Domain 4 Penetration Testing Tools/22. PowerShell Script Example.srt 7KB
  140. 7. Conclusion/3. BONUS Where to go from here.srt 7KB
  141. 5. Domain 4 Penetration Testing Tools/18. Intro to Programming.srt 7KB
  142. 5. Domain 4 Penetration Testing Tools/1. Penetration Testing Tools (Overview).srt 7KB
  143. 4. Domain 3 Attacks and Exploits/10. Local Host Vulnerabilities.srt 7KB
  144. 3. Domain 2 Information Gathering and Vulnerability Identification/13. Application and Container Scans.srt 6KB
  145. 2. Domain 1 Planning and Scoping/6. Testing Strategies.srt 6KB
  146. 3. Domain 2 Information Gathering and Vulnerability Identification/9. Decompiling and Debugging.srt 6KB
  147. 5. Domain 4 Penetration Testing Tools/8. Debuggers.srt 6KB
  148. 5. Domain 4 Penetration Testing Tools/9. Software Assurance.srt 5KB
  149. 5. Domain 4 Penetration Testing Tools/16. Mobile Tools.srt 5KB
  150. 4. Domain 3 Attacks and Exploits/1. Attacks and Exploits (Overview).srt 4KB
  151. 5. Domain 4 Penetration Testing Tools/7. Password Cracking (Demo).srt 4KB
  152. 6. Domain 5 Reporting and Communication/1. Reporting and Communication (Overview).srt 4KB
  153. 5. Domain 4 Penetration Testing Tools/5. Scanners.srt 4KB
  154. 5. Domain 4 Penetration Testing Tools/11. Wireless.srt 4KB
  155. 7. Conclusion/1. Conclusion.srt 4KB
  156. 5. Domain 4 Penetration Testing Tools/15. Networking Tools.srt 4KB
  157. 4. Domain 3 Attacks and Exploits/5. Lock Picking (Demo).srt 3KB
  158. 3. Domain 2 Information Gathering and Vulnerability Identification/7. Cryptographic Inspection.srt 3KB
  159. 5. Domain 4 Penetration Testing Tools/13. Social Engineering Tools.srt 3KB
  160. 2. Domain 1 Planning and Scoping/1. Planning and Scoping (Overview).srt 3KB
  161. 5. Domain 4 Penetration Testing Tools/20.1 Bash Example (Scan with Nmap).txt 3KB
  162. 5. Domain 4 Penetration Testing Tools/21.1 Python Example (Public IP).txt 2KB
  163. 6. Domain 5 Reporting and Communication/6. Pentest Report Example.srt 2KB
  164. 5. Domain 4 Penetration Testing Tools/23.1 Ruby Example (Banner Grabber).txt 773B
  165. 1. Introduction/2. Download the Study Guide.html 222B
  166. 7. Conclusion/2.1 Click here to download the Metasploitable2 virtual machine.html 143B
  167. 7. Conclusion/2.2 Click here to download the Kali Linux virtual machine.html 143B
  168. [Tutorialsplanet.NET].url 128B
  169. 2. Domain 1 Planning and Scoping/12. Domain 1 Quiz.html 122B
  170. 3. Domain 2 Information Gathering and Vulnerability Identification/18. Domain 2 Quiz.html 122B
  171. 4. Domain 3 Attacks and Exploits/19. Domain 3 Quiz.html 122B
  172. 5. Domain 4 Penetration Testing Tools/24. Domain 4 Quiz.html 122B
  173. 6. Domain 5 Reporting and Communication/7. Domain 5 Quiz.html 122B
  174. 8. PENTEST+ (PT0-001) Practice Exam/1. Pentest+ (PT0-001) Practice Exam.html 122B
  175. 7. Conclusion/3.1 Join our official Facebook group.html 106B
  176. 7. Conclusion/3.2 Connect with Jason at Dion Training.html 86B