Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam (/Thread-Udemy-CompTIA-Pentest-Ethical-Hacking-Course-Practice-Exam--647880) |
Udemy - CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - AD-TEAM - 11-09-2024 11.6 GB | 00:12:18 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
001 Welcome (266.18 MB) 003 Exam Tips (83.49 MB) 001 Planning an Engagement (OBJ 1 1, 1 2, and 1 3) (10.38 MB) 002 Risk (OBJ 1 2) (92.74 MB) 003 Risk Handling (OBJ 1 2) (71.07 MB) 004 Controls (OBJ 1 2) (57 MB) 005 PenTest Methodologies (OBJ 1 2) (27.15 MB) 006 PenTest Standards (OBJ 1 2) (38.42 MB) 007 Planning a Test (OBJ 1 2) (66.62 MB) 008 Legal Concepts (OBJ 1 1) (58.63 MB) 009 Regulatory Compliance (OBJ 1 1) (104.54 MB) 010 Professionalism (OBJ 1 3) (67.46 MB) 001 Scoping an Engagement (OBJ 1 1, 1 2, and 1 3) (10.49 MB) 002 Defining the Scope (OBJ 1 2) (62.01 MB) 003 Adversary Emulation (OBJ 1 2) (116.03 MB) 004 Target List (OBJ 1 2) (79.32 MB) 005 Identifying Restrictions (OBJ 1 1) (81.25 MB) 006 Rules of Engagement (OBJ 1 2) (82.72 MB) 007 Assessment Types (OBJ 1 3) (49.11 MB) 008 Validating the Scope (OBJ 1 2) (42.03 MB) 009 Limitations and Permission (OBJ 1 1 and 1 3) (57.14 MB) 010 Build a Virtual Lab (101.62 MB) 001 Passive Reconnaissance (OBJ 2 1) (30.39 MB) 002 Information Gathering (OBJ 2 1) (40.66 MB) 003 Open-Source Intelligence (OSINT) (OBJ 2 1) (47.01 MB) 004 Social Media Scraping (OBJ 2 1) (68.67 MB) 005 OSINT Tools (OBJ 2 1) (61.4 MB) 006 Using OSINT Tools (OBJ 2 1) (170.22 MB) 007 DNS Information (OBJ 2 1) (58.05 MB) 008 Reconnaissance with CentralOps (OBJ 2 1) (105.37 MB) 009 Public Repositories (OBJ2 1) (32.68 MB) 010 Search Engine Analysis (OBJ 2 1) (15.96 MB) 011 URL Analysis (OBJ 2 1) (96.21 MB) 012 Cryptographic Flaws (OBJ 2 1) (62.81 MB) 013 CWE & CVE (OBJ 2 1) (37.3 MB) 001 Active Reconnaissance (OBJ 2 2 and 2 3) (10.24 MB) 002 Scanning and Enumeration (OBJ 2 2 and 2 3) (43.71 MB) 003 Conducting Enumeration (OBJ 2 3) (124.42 MB) 004 Other Enumeration (OBJ 2 2 and 2 3) (26.98 MB) 005 Website Reconnaissance (OBJ 2 3) (49.57 MB) 006 Detecting and Evading Defenses (OBJ 2 2) (50.06 MB) 007 Packet Crafting (OBJ 2 2) (59.58 MB) 008 Eavesdropping (OBJ 2 2) (103.09 MB) 009 Wardriving (OBJ 2 2) (81.21 MB) 010 DNS and ARP Analysis (OBJ 2 3) (63.15 MB) 011 Network Traffic Analysis (OBJ 2 3) (170.55 MB) 001 Vulnerability Scanning (OBJ 2 3 and 2 4) (8.64 MB) 002 Vulnerability Lifecycle (OBJ 2 3 and 2 4) (48.5 MB) 003 Vulnerability Scans (OBJ 2 3 and 2 4) (67.1 MB) 004 Scanning Considerations (OBJ 2 3 and 2 4) (75.29 MB) 005 Nessus Scanning (OBJ 2 3 and 2 4) (73.92 MB) 006 OpenVas Scanning (OBJ 2 3 and 2 4) (77.08 MB) 007 Nikto Scanning (OBJ 2 3 and 2 4) (64.58 MB) 001 Nmap (OBJ 2 3 and 2 4) (7.67 MB) 002 Nmap Discovery Scans (OBJ 2 3 and 2 4) (44.11 MB) 003 Nmap Port Scans (OBJ 2 3 and 2 4) (27.56 MB) 004 Nmap Fingerprinting (OBJ 2 3 and 2 4) (24.45 MB) 005 Using Nmap (OBJ 2 3 and 2 4) (86.37 MB) 006 Nmap Scripting Engine (OBJ 2 3 and 2 4) (170.28 MB) 001 Social Engineering and Physical Attacks (OBJ 3 6) (20.74 MB) 002 Methods of Influence (OBJ 3 6) (97.99 MB) 003 Social Engineering (OBJ 3 6) (114.36 MB) 004 Phishing Campaigns (OBJ 3 6) (24.06 MB) 005 Social Engineering Toolkit (OBJ 3 6) (104.09 MB) 006 Pretexting (OBJ 3 6) (47.79 MB) 007 Baiting Victims (OBJ 3 6) (51.89 MB) 008 Impersonation (OBJ 3 6) (39.84 MB) 009 Physical Security (OBJ 3 6) (199.42 MB) 010 Lock Picking (OBJ 3 6) (9.71 MB) 011 Physical Attacks (OBJ 3 6) (29.51 MB) 012 Social Engineering Tools (OBJ 3 6) (34.73 MB) 001 Wireless Attacks (OBJ 3 2) (15.28 MB) 002 Wireless Security (OBJ 3 2) (54.46 MB) 003 Bypassing MAC Filtering (OBJ 3 2) (19.99 MB) 004 Signal Exploitation (OBJ 3 2) (54.64 MB) 005 WEP Hacking (OBJ 3 2) (42.01 MB) 006 WPAWPA2 Hacking (OBJ 3 2) (31 MB) 007 WPS PIN Attacks (OBJ 3 2) (80.68 MB) 008 Evil Twins (OBJ 3 2) (30.62 MB) 009 On-path and Relay Attacks (OBJ 3 2) (10.63 MB) 010 Bluetooth Attacks (OBJ 3 2) (43.52 MB) 011 RFID and NFC Attacks (OBJ 3 2) (36.23 MB) 001 Network Attacks (OBJ 3 1) (29.03 MB) 002 Stress Testing (OBJ 3 1) (32.37 MB) 003 Exploit Resources (OBJ 3 1) (43.2 MB) 004 ARP Poisoning (OBJ 3 1) (28.58 MB) 005 DNS Cache Poisoning (OBJ 3 1) (28.34 MB) 006 LLMNRNBT-NS Poisoning (OBJ 3 1) (23.01 MB) 007 MAC Spoofing (OBJ 3 1) (30.71 MB) 008 VLAN Hopping (OBJ 3 1) (30.89 MB) 009 NAC Bypass (OBJ 3 1) (44.79 MB) 010 On-path Attack (OBJ 3 1) (12.22 MB) 011 Password Attacks (OBJ 3 1) (81.76 MB) 012 Pass the Hash (OBJ 3 1) (32.67 MB) 013 Intro to Metasploit (OBJ 3 1) (115.4 MB) 014 Netcat (OBJ 3 1) (18.61 MB) 015 Using Netcat (OBJ 3 1) (22.09 MB) 001 Application Vulnerabilities (OBJ 3 3) (31.99 MB) 002 Race Conditions (OBJ 3 3) (27.91 MB) 003 Buffer Overflows (OBJ 3 3) (53.88 MB) 004 Buffer Overflow Attacks (OBJ 3 3) (27.42 MB) 005 Authentication and References (OBJ 3 3) (45.1 MB) 006 Improper Error Handling (OBJ 3 3) (13.32 MB) 007 Improper Headers (OBJ 3 3) (21.63 MB) 008 Code Signing (OBJ 3 3) (14.98 MB) 009 Vulnerable Components (OBJ 3 3) (105.92 MB) 010 Software Composition (OBJ 3 3) (78.95 MB) 011 Privilege Escalation (OBJ 3 3) (15.02 MB) 012 Conducting Privilege Escalation (OBJ 3 3) (188.29 MB) 001 Application Attacks (OBJ 3 3) (11.82 MB) 002 Directory Traversals (OBJ 3 3) (67.02 MB) 003 Dirbuster (OBJ 3 3) (25.9 MB) 004 Cross-Site Scripting (XSS) (OBJ 3 3) (25.83 MB) 005 Cross-Site Request Forgery (CSRF) (OBJ 3 3) (37.37 MB) 006 SQL Injections (OBJ 3 3) (19.03 MB) 007 Conducting SQL Injections (OBJ 3 3) (35.94 MB) 008 Burp Suite and SQLmap (OBJ 3 3) (98.16 MB) 009 OWASP ZAP (OBJ 3 3) (21.18 MB) 010 XML Injections (OBJ 3 3) (23.65 MB) 011 Other Injection Attacks (OBJ 3 3) (9.71 MB) 012 Attacking Web Applications (OBJ 3 3) (129.88 MB) 001 Cloud Attacks (OBJ 3 4) (6.53 MB) 002 Attacking the Cloud (OBJ 3 4) (24.39 MB) 003 Credential Harvesting (OBJ 3 4) (41.32 MB) 004 Misconfigured Assets (OBJ 3 4) (59.7 MB) 005 Metadata Service Attack (OBJ 3 4) (23.67 MB) 006 Software Development Kit (SDK) (OBJ 3 4) (8.27 MB) 007 Auditing the Cloud (OBJ 3 4) (25.59 MB) 008 Conducting Cloud Audits (OBJ 3 4) (105.08 MB) 001 Attacks on Mobile Devices (OBJ 3 5) (28.24 MB) 002 Enterprise Mobility Management (OBJ 3 5) (62.11 MB) 003 Deployment Options (OBJ 3 5) (29.09 MB) 004 Mobile Reconnaissance Concerns (OBJ 3 5) (69.36 MB) 005 Mobile Device Insecurity (OBJ 3 5) (115.78 MB) 006 Multifactor Authentication (OBJ 3 5) (110.92 MB) 007 Mobile Device Attacks (OBJ 3 5) (21.49 MB) 008 Malware Analysis (OBJ 3 5) (85.98 MB) 009 Conducting Malware Analysis (OBJ 3 5) (159.71 MB) 010 Mobile Device Tools (OBJ 3 5) (19.3 MB) 001 Attacks on Specialized Systems (OBJ 3 5) (12.46 MB) 002 Internet of Things (IoT) Devices (OBJ 3 5) (85.22 MB) 003 Internet of Things (IoT) Vulnerabilities (OBJ 3 5) (44.15 MB) 004 Embedded Systems (OBJ 3 5) (22.01 MB) 005 ICS and SCADA Devices (OBJ 3 5) (59.87 MB) 006 ICS Protocols and Vulnerabilities (OBJ 3 5) (106.06 MB) 007 Data Storage Vulnerabilities (OBJ 3 5) (42.79 MB) 008 Virtual Environments (OBJ 3 5) (41.3 MB) 009 Virtual Machine Attacks (OBJ 3 5) (37.5 MB) 010 Containerization (OBJ 3 5) (38.78 MB) 001 Post-exploitation (OBJ 3 7) (8.52 MB) 002 Enumerating the Network (OBJ 3 7) (24.77 MB) 003 Network Segmentation Testing (OBJ 3 7) (23.99 MB) 004 Lateral Movement and Pivoting (OBJ 3 7) (12.91 MB) 005 Pass the Hash (OBJ 3 7) (39.43 MB) 006 Golden Ticket (OBJ 3 7) (17.34 MB) 007 Lateral Movement (OBJ 3 7) (73.36 MB) 008 Pivoting (3 7) (34.45 MB) 009 Escalating Privileges (OBJ 3 7) (98.01 MB) 010 Upgrading Restrictive Shells (OBJ 3 7) (27.12 MB) 001 Detection Avoidance (OBJ 3 7) (4.75 MB) 002 Trojans and Backdoors (OBJ 3 7) (26.61 MB) 003 Creating Persistence (OBJ 3 7) (55.94 MB) 004 Living Off the Land (OBJ 3 7) (66.63 MB) 005 Data Exfiltration (OBJ 3 7) (38.42 MB) 006 Covert Channels (OBJ 3 7) (13.6 MB) 007 Steganography (3 7) (15.25 MB) 008 Covering Your Tracks (OBJ 3 7) (30.32 MB) 009 Persistence and Covering Your Tracks (OBJ 3 7) (69.94 MB) 010 Post-Exploitation Tools (OBJ 3 7) (8.02 MB) 001 Communication and Reports (OBJ 4 3) (5.39 MB) 002 Communication Paths (OBJ 4 3) (35.25 MB) 003 Communication Triggers (OBJ 4 3) (30.87 MB) 004 Reasons for Communication (OBJ 4 3) (60.69 MB) 005 Presentation of Findings (4 1 & OBJ 4 3) (65.26 MB) 006 Report Data Gathering (OBJ 4 1) (16.02 MB) 007 Written Reports (OBJ 4 1) (118.8 MB) 008 Common Themes (OBJ 4 1) (8.65 MB) 009 Securing and Storing Reports (OBJ 4 1) (21.29 MB) 001 Findings and Remediations (OBJ 4 2) (11.16 MB) 002 Security Control Categories (OBJ 4 2) (108.84 MB) 003 Selecting Security Controls (OBJ 4 2) (38.19 MB) 004 Physical Controls (OBJ 4 2) (83.26 MB) 005 Operational Controls (OBJ 4 2) (68.69 MB) 006 Administrative Controls (OBJ 4 2) (71.7 MB) 007 System Hardening (OBJ 4 2) (31.3 MB) 008 Secure Coding (OBJ 4 2) (23.58 MB) 009 Implementing MFA (OBJ 4 2) (41.16 MB) 010 Digital Certificates (OBJ 4 2) (55.48 MB) 011 Other Technical Controls (OBJ 4 2) (9.66 MB) 012 Mitigation Strategies (OBJ 4 2) (96.04 MB) 001 Post-report Activities (OBJ 4 4) (12.01 MB) 002 Removing Shells and Tools (OBJ 4 4) (14.32 MB) 003 Deleting Test Credentials (OBJ 4 4) (9.61 MB) 004 Destroy Test Data (OBJ 4 4) (9.34 MB) 005 Client Acceptance (OBJ 4 4) (23.32 MB) 006 Attestation of Findings (OBJ 4 4) (25.31 MB) 007 Lessons Learned (OBJ 4 4) (28.9 MB) 008 Retesting (OBJ 4 4) (9.82 MB) 001 Scripting Basics (OBJ 5 1 & OBJ 5 2) (7.2 MB) 002 Scripting Tools (OBJ 5 2) (49.38 MB) 003 Variables (OBJ 5 1) (41.3 MB) 004 Loops (OBJ 5 1) (10.64 MB) 005 Logic Control (OBJ 5 1) (13.28 MB) 006 Data Structures (OBJ 5 1) (31.17 MB) 007 Object Oriented Programming (OBJ 5 1) (25.08 MB) 001 Analyzing Scripts (OBJ 5 2) (31.27 MB) 002 Coding in Bash (OBJ 5 2) (110.83 MB) 003 Bash Example (OBJ 5 2) (18.58 MB) 004 Coding in PowerShell (OBJ 5 2) (74.7 MB) 005 PowerShell Example (OBJ 5 2) (26.58 MB) 006 Coding in Python (OBJ 5 2) (71.71 MB) 007 Python Example (OBJ 5 2) (15.8 MB) 008 Coding in Perl (OBJ 5 2) (64.19 MB) 009 Perl Example (OBJ 5 2) (108.11 MB) 010 Coding in JavaScript (OBJ 5 2) (115.17 MB) 011 JavaScript Example (OBJ 5 2) (44.04 MB) 012 Coding in Ruby (OBJ 5 2) (49.57 MB) 013 Ruby Example (OBJ 5 2) (19.04 MB) 001 Exploits and Automation (OBJ 5 2) (9.36 MB) 002 Exploits to Download Files (OBJ 5 2) (14.55 MB) 003 Exploits for Remote Access (OBJ 5 2) (35.14 MB) 004 Exploits for Enumerating Users (OBJ 5 2) (16.94 MB) 005 Exploits for Enumerating Assets (OBJ 5 2) (17.03 MB) 006 Automation in Engagements (OBJ 5 2) (21.17 MB) 007 Automation with Nmap Scripts (OBJ 5 2) (12.89 MB) 001 Tool Round-up (OBJ 5 3) (12.71 MB) 002 OSINT Tools (OBJ 5 3) (35.94 MB) 003 Scanning Tools (OBJ 5 3) (38.28 MB) 004 Networking Tools (OBJ 5 3) (15.83 MB) 005 Wireless Tools (OBJ 5 3) (28.96 MB) 006 Social Engineering Tools (OBJ 5 3) (14.51 MB) 007 Remote Access Tools (OBJ 5 3) (24.25 MB) 008 Credential Testing Tools (OBJ 5 3) (46.62 MB) 009 Web Application Tools (OBJ 5 3) (16.23 MB) 010 Cloud Tools (OBJ 5 3) (11.67 MB) 011 Steganography Tools (OBJ 5 3) (50.82 MB) 012 Debuggers (OBJ 5 3) (44.02 MB) 013 Miscellaneous Tools (OBJ 5 3) (59.18 MB) 001 Conclusion (136.3 MB) 002 BONUS Where to go from here (60.46 MB)
Screenshot
RapidGator
FileAxa TurboBit |