File List
-
01 Introduction/001 Welcome to the course.mp4 75.04 MB
01 Introduction/002 CompTIA-Pentest-Study-Notes.pdf 2.22 MB
01 Introduction/002 Download the Study Guide.html 1.06 KB
01 Introduction/003 Exam Foundations.mp4 87.61 MB
02 Domain 1 Planning and Scoping/004 Planning and Scoping (Overview).mp4 26.22 MB
02 Domain 1 Planning and Scoping/005 Penetration Testing Methodology.mp4 60.57 MB
02 Domain 1 Planning and Scoping/006 Planning a Penetration Test.mp4 152.9 MB
02 Domain 1 Planning and Scoping/007 Rules of Engagement.mp4 107.68 MB
02 Domain 1 Planning and Scoping/008 Legal Concepts.mp4 195.02 MB
02 Domain 1 Planning and Scoping/009 Testing Strategies.mp4 54.86 MB
02 Domain 1 Planning and Scoping/010 White Box Support Resources.mp4 119.23 MB
02 Domain 1 Planning and Scoping/011 Types of Assessments.mp4 106.16 MB
02 Domain 1 Planning and Scoping/012 Threat Actors.mp4 140.21 MB
02 Domain 1 Planning and Scoping/013 Target Selection.mp4 101.78 MB
02 Domain 1 Planning and Scoping/014 Other Scoping Considerations.mp4 129.12 MB
03 Domain 2 Information Gathering and Vulnerability Identification/015 Information Gathering and Vulnerability Identification (Overview).mp4 48.42 MB
03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering.mp4 189.14 MB
03 Domain 2 Information Gathering and Vulnerability Identification/017 Reconnaissance with CentralOps (Demo).mp4 120.53 MB
03 Domain 2 Information Gathering and Vulnerability Identification/018 Scanning and Enumeration.mp4 84.22 MB
03 Domain 2 Information Gathering and Vulnerability Identification/019 Fingerprinting.mp4 78.74 MB
03 Domain 2 Information Gathering and Vulnerability Identification/020 Scanning and Enumeration (Demo).mp4 177.94 MB
03 Domain 2 Information Gathering and Vulnerability Identification/021 Cryptographic Inspection.mp4 28.27 MB
03 Domain 2 Information Gathering and Vulnerability Identification/022 Eavesdropping.mp4 62.4 MB
03 Domain 2 Information Gathering and Vulnerability Identification/023 Decompiling and Debugging.mp4 50.83 MB
03 Domain 2 Information Gathering and Vulnerability Identification/024 Open Source Research.mp4 115.38 MB
03 Domain 2 Information Gathering and Vulnerability Identification/025 Vulnerability Scanning.mp4 168.98 MB
03 Domain 2 Information Gathering and Vulnerability Identification/026 Scanning Considerations.mp4 104.51 MB
03 Domain 2 Information Gathering and Vulnerability Identification/027 Application and Container Scans.mp4 54.79 MB
03 Domain 2 Information Gathering and Vulnerability Identification/028 Analyzing Vulnerability Scans.mp4 136.73 MB
03 Domain 2 Information Gathering and Vulnerability Identification/029 Leverage Information for Exploit.mp4 63.72 MB
03 Domain 2 Information Gathering and Vulnerability Identification/030 Common Attack Vectors.mp4 121.95 MB
03 Domain 2 Information Gathering and Vulnerability Identification/031 Weaknesses in Specialized Systems.mp4 202.45 MB
04 Domain 3 Attacks and Exploits/032 Attacks and Exploits (Overview).mp4 36.57 MB
04 Domain 3 Attacks and Exploits/033 Social Engineering.mp4 237.92 MB
04 Domain 3 Attacks and Exploits/034 Motivation Factors.mp4 138.49 MB
04 Domain 3 Attacks and Exploits/035 Physical Security Attacks.mp4 104.95 MB
04 Domain 3 Attacks and Exploits/036 Lock Picking (Demo).mp4 26.85 MB
04 Domain 3 Attacks and Exploits/037 Network-based Vulnerabilities.mp4 255.2 MB
04 Domain 3 Attacks and Exploits/038 Wireless-based Vulnerabilities.mp4 160.2 MB
04 Domain 3 Attacks and Exploits/039 Wireless Network Attack (Demo).mp4 77.29 MB
04 Domain 3 Attacks and Exploits/040 Application-based Vulnerabilities.mp4 324.37 MB
04 Domain 3 Attacks and Exploits/041 Local Host Vulnerabilities.mp4 52.98 MB
04 Domain 3 Attacks and Exploits/042 Privilege Escalation (Linux).mp4 86.14 MB
04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Windows).mp4 192.71 MB
04 Domain 3 Attacks and Exploits/044 Privilege Escalation.mp4 93.77 MB
04 Domain 3 Attacks and Exploits/045 Privilege Escalation (Demo).mp4 90.88 MB
04 Domain 3 Attacks and Exploits/046 Lateral Movement.mp4 163.68 MB
04 Domain 3 Attacks and Exploits/047 Persistence.mp4 125.03 MB
04 Domain 3 Attacks and Exploits/048 Covering Your Tracks.mp4 101.56 MB
04 Domain 3 Attacks and Exploits/049 Persistence and Covering Tracks (Demo).mp4 107.75 MB
05 Domain 4 Penetration Testing Tools/050 Penetration Testing Tools (Overview).mp4 47.63 MB
05 Domain 4 Penetration Testing Tools/051 Nmap Usage.mp4 194.82 MB
05 Domain 4 Penetration Testing Tools/052 Nmap Usage (Demo).mp4 96.1 MB
05 Domain 4 Penetration Testing Tools/053 Use Cases for Tools.mp4 137.91 MB
05 Domain 4 Penetration Testing Tools/054 Scanners.mp4 41.02 MB
05 Domain 4 Penetration Testing Tools/055 Credential Testing Tools.mp4 121.23 MB
05 Domain 4 Penetration Testing Tools/056 Password Cracking (Demo).mp4 26.18 MB
05 Domain 4 Penetration Testing Tools/057 Debuggers.mp4 46.97 MB
05 Domain 4 Penetration Testing Tools/058 Software Assurance.mp4 42.05 MB
05 Domain 4 Penetration Testing Tools/059 OSINT.mp4 93.2 MB
05 Domain 4 Penetration Testing Tools/060 Wireless.mp4 33.82 MB
05 Domain 4 Penetration Testing Tools/061 Web Proxies.mp4 105.91 MB
05 Domain 4 Penetration Testing Tools/062 Social Engineering Tools.mp4 23.04 MB
05 Domain 4 Penetration Testing Tools/063 Remote Access Tools.mp4 93.92 MB
05 Domain 4 Penetration Testing Tools/064 Networking Tools.mp4 31.17 MB
05 Domain 4 Penetration Testing Tools/065 Mobile Tools.mp4 41.25 MB
05 Domain 4 Penetration Testing Tools/066 Miscellaneous Tools.mp4 85.7 MB
05 Domain 4 Penetration Testing Tools/067 Intro to Programming.mp4 52.29 MB
05 Domain 4 Penetration Testing Tools/068 Programming Concepts.mp4 405.71 MB
05 Domain 4 Penetration Testing Tools/069 BASH Script Example.mp4 79.56 MB
05 Domain 4 Penetration Testing Tools/069 Bash-Example-Scan-with-Nmap.txt 2.79 KB
05 Domain 4 Penetration Testing Tools/070 Python Script Example.mp4 60.99 MB
05 Domain 4 Penetration Testing Tools/070 Python-Example-Public-IP.txt 2.37 KB
05 Domain 4 Penetration Testing Tools/071 PowerShell Script Example.mp4 56.66 MB
05 Domain 4 Penetration Testing Tools/071 PowerShell-Example-Enumerator.txt 8.69 KB
05 Domain 4 Penetration Testing Tools/072 MS17-010-Exploit-700-lines-of-Ruby.txt 25.82 KB
05 Domain 4 Penetration Testing Tools/072 Ruby Script Example.mp4 81.33 MB
05 Domain 4 Penetration Testing Tools/072 Ruby-Example-Banner-Grabber.txt 773 B
06 Domain 5 Reporting and Communication/073 Reporting and Communication (Overview).mp4 36.25 MB
06 Domain 5 Reporting and Communication/074 Pentest Communications.mp4 164.67 MB
06 Domain 5 Reporting and Communication/075 Report Writing.mp4 150.94 MB
06 Domain 5 Reporting and Communication/076 Mitigation Strategies.mp4 133.05 MB
06 Domain 5 Reporting and Communication/077 Post-Report Activities.mp4 85.57 MB
06 Domain 5 Reporting and Communication/078 Pentest Report Example.mp4 16.55 MB
06 Domain 5 Reporting and Communication/external-assets-links.txt 189 B
07 Conclusion/079 Conclusion.mp4 38.26 MB
07 Conclusion/080 Creating Your Pentest Lab.mp4 154.54 MB
07 Conclusion/081 BONUS Where to go from here.mp4 59.85 MB
07 Conclusion/external-assets-links.txt 440 B
Download Info
-
Tips
“UD63” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.