Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series) - TorrentBank

File Name:Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:6.40 GB

File Count:56

File Hash:73ab58f5b83d698883d258ca3aebcfc39fa82c9f

Magnet Link:

Magnet Link:

Torrent File:

01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 132.89 MB
02.Learning objectives.mp4 67.43 MB
03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 314.52 MB
04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 453.29 MB
05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 159.53 MB
06.1.4 Exploring How to Plan and Fund a Red Team.mp4 186.02 MB
07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 212.22 MB
08.1.6 Understanding How to Create and Hire the Red Team.mp4 136.64 MB
09.1.7 Understanding Red Team Collaboration.mp4 150.80 MB
10.Learning objectives.mp4 31.11 MB
11.2.1 Understanding the Red Team Environment.mp4 624.99 MB
12.2.2 Understanding Passive Recon.mp4 135.81 MB
13.Learning objectives.mp4 24.12 MB
14.3.1 Surveying Social Engineering Methodologies.mp4 231.24 MB
15.3.2 Understanding How to Target Employees.mp4 156.81 MB
16.3.3 Exploiting Social Engineering Tools.mp4 192.47 MB
17.Learning objectives.mp4 40.37 MB
18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 69.14 MB
19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 80.06 MB
20.4.3 Understanding Scanning Tools.mp4 45.51 MB
21.4.4 Exploring How to Automate Scans.mp4 205.71 MB
22.4.5 Using Shodan and Its API.mp4 106.18 MB
23.4.6 Exploring Vulnerability Scanners.mp4 149.19 MB
24.4.7 Understanding Binary and Source Code Scanners.mp4 46.07 MB
25.4.8 Understanding How to Perform Continuous Monitoring.mp4 39.44 MB
26.Learning objectives.mp4 29.38 MB
27.5.1 Exploring How to Target Hosts.mp4 40.04 MB
28.5.2 Exploring Web App Testing Essential Tools.mp4 171.68 MB
29.5.3 Understanding Enterprise Application Continuous Testing.mp4 94.67 MB
30.Learning objectives.mp4 21.26 MB
31.6.1 Understanding How to Initially Get on the Network.mp4 27.47 MB
32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 69.96 MB
33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 222.64 MB
34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 179.39 MB
35.Learning objectives.mp4 31.62 MB
36.7.1 Learning Privilege Escalation Methodologies.mp4 74.06 MB
37.7.2 Understanding Lateral Movement.mp4 217.48 MB
38.7.3 Surveying Privilege Escalation Essential Tools.mp4 60.55 MB
39.Learning objectives.mp4 55.28 MB
40.8.1 Understanding Persistent Access.mp4 15.61 MB
41.8.2 Learning How to Achieve Domain Admin Access.mp4 79.38 MB
42.8.3 Understanding How to Compromise User Credentials.mp4 127.78 MB
43.8.4 Surveying Password Cracking & Reporting.mp4 48.04 MB
44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 36.46 MB
45.8.6 Searching for Sensitive Data.mp4 141.63 MB
46.8.7 Understanding Data Exfiltration Techniques.mp4 103.15 MB
47.8.8 Understanding How to Cover Your Tracks.mp4 78.16 MB
48.Learning objectives.mp4 26.04 MB
49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 210.69 MB
50.9.2 Exploring How to Test in the Cloud.mp4 181.58 MB
51.Learning objectives.mp4 24.83 MB
52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 73.71 MB
53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 29.00 MB
54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 92.16 MB
fkSJH.jpg 25.46 KB
info.txt 6.06 KB
No trackers found

TorrentBank
Copyright © 2024