https://img87.pixhost.to/images/599/359020115_tuto.jpg
11.6 GB | 00:12:18 | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
001 Welcome  (266.18 MB)
003 Exam Tips  (83.49 MB)
001 Planning an Engagement (OBJ 1 1, 1 2, and 1 3)  (10.38 MB)
002 Risk (OBJ 1 2)  (92.74 MB)
003 Risk Handling (OBJ 1 2)  (71.07 MB)
004 Controls (OBJ 1 2)  (57 MB)
005 PenTest Methodologies (OBJ 1 2)  (27.15 MB)
006 PenTest Standards (OBJ 1 2)  (38.42 MB)
007 Planning a Test (OBJ 1 2)  (66.62 MB)
008 Legal Concepts (OBJ 1 1)  (58.63 MB)
009 Regulatory Compliance (OBJ 1 1)  (104.54 MB)
010 Professionalism (OBJ 1 3)  (67.46 MB)
001 Scoping an Engagement (OBJ 1 1, 1 2, and 1 3)  (10.49 MB)
002 Defining the Scope (OBJ 1 2)  (62.01 MB)
003 Adversary Emulation (OBJ 1 2)  (116.03 MB)
004 Target List (OBJ 1 2)  (79.32 MB)
005 Identifying Restrictions (OBJ 1 1)  (81.25 MB)
006 Rules of Engagement (OBJ 1 2)  (82.72 MB)
007 Assessment Types (OBJ 1 3)  (49.11 MB)
008 Validating the Scope (OBJ 1 2)  (42.03 MB)
009 Limitations and Permission (OBJ 1 1 and 1 3)  (57.14 MB)
010 Build a Virtual Lab  (101.62 MB)
001 Passive Reconnaissance (OBJ 2 1)  (30.39 MB)
002 Information Gathering (OBJ 2 1)  (40.66 MB)
003 Open-Source Intelligence (OSINT) (OBJ 2 1)  (47.01 MB)
004 Social Media Scraping (OBJ 2 1)  (68.67 MB)
005 OSINT Tools (OBJ 2 1)  (61.4 MB)
006 Using OSINT Tools (OBJ 2 1)  (170.22 MB)
007 DNS Information (OBJ 2 1)  (58.05 MB)
008 Reconnaissance with CentralOps (OBJ 2 1)  (105.37 MB)
009 Public Repositories (OBJ2 1)  (32.68 MB)
010 Search Engine Analysis (OBJ 2 1)  (15.96 MB)
011 URL Analysis (OBJ 2 1)  (96.21 MB)
012 Cryptographic Flaws (OBJ 2 1)  (62.81 MB)
013 CWE & CVE (OBJ 2 1)  (37.3 MB)
001 Active Reconnaissance (OBJ 2 2 and 2 3)  (10.24 MB)
002 Scanning and Enumeration (OBJ 2 2 and 2 3)  (43.71 MB)
003 Conducting Enumeration (OBJ 2 3)  (124.42 MB)
004 Other Enumeration (OBJ 2 2 and 2 3)  (26.98 MB)
005 Website Reconnaissance (OBJ 2 3)  (49.57 MB)
006 Detecting and Evading Defenses (OBJ 2 2)  (50.06 MB)
007 Packet Crafting (OBJ 2 2)  (59.58 MB)
008 Eavesdropping (OBJ 2 2)  (103.09 MB)
009 Wardriving (OBJ 2 2)  (81.21 MB)
010 DNS and ARP Analysis (OBJ 2 3)  (63.15 MB)
011 Network Traffic Analysis (OBJ 2 3)  (170.55 MB)
001 Vulnerability Scanning (OBJ 2 3 and 2 4)  (8.64 MB)
002 Vulnerability Lifecycle (OBJ 2 3 and 2 4)  (48.5 MB)
003 Vulnerability Scans (OBJ 2 3 and 2 4)  (67.1 MB)
004 Scanning Considerations (OBJ 2 3 and 2 4)  (75.29 MB)
005 Nessus Scanning (OBJ 2 3 and 2 4)  (73.92 MB)
006 OpenVas Scanning (OBJ 2 3 and 2 4)  (77.08 MB)
007 Nikto Scanning (OBJ 2 3 and 2 4)  (64.58 MB)
001 Nmap (OBJ 2 3 and 2 4)  (7.67 MB)
002 Nmap Discovery Scans (OBJ 2 3 and 2 4)  (44.11 MB)
003 Nmap Port Scans (OBJ 2 3 and 2 4)  (27.56 MB)
004 Nmap Fingerprinting (OBJ 2 3 and 2 4)  (24.45 MB)
005 Using Nmap (OBJ 2 3 and 2 4)  (86.37 MB)
006 Nmap Scripting Engine (OBJ 2 3 and 2 4)  (170.28 MB)
001 Social Engineering and Physical Attacks (OBJ 3 6)  (20.74 MB)
002 Methods of Influence (OBJ 3 6)  (97.99 MB)
003 Social Engineering (OBJ 3 6)  (114.36 MB)
004 Phishing Campaigns (OBJ 3 6)  (24.06 MB)
005 Social Engineering Toolkit (OBJ 3 6)  (104.09 MB)
006 Pretexting (OBJ 3 6)  (47.79 MB)
007 Baiting Victims (OBJ 3 6)  (51.89 MB)
008 Impersonation (OBJ 3 6)  (39.84 MB)
009 Physical Security (OBJ 3 6)  (199.42 MB)
010 Lock Picking (OBJ 3 6)  (9.71 MB)
011 Physical Attacks (OBJ 3 6)  (29.51 MB)
012 Social Engineering Tools (OBJ 3 6)  (34.73 MB)
001 Wireless Attacks (OBJ 3 2)  (15.28 MB)
002 Wireless Security (OBJ 3 2)  (54.46 MB)
003 Bypassing MAC Filtering (OBJ 3 2)  (19.99 MB)
004 Signal Exploitation (OBJ 3 2)  (54.64 MB)
005 WEP Hacking (OBJ 3 2)  (42.01 MB)
006 WPAWPA2 Hacking (OBJ 3 2)  (31 MB)
007 WPS PIN Attacks (OBJ 3 2)  (80.68 MB)
008 Evil Twins (OBJ 3 2)  (30.62 MB)
009 On-path and Relay Attacks (OBJ 3 2)  (10.63 MB)
010 Bluetooth Attacks (OBJ 3 2)  (43.52 MB)
011 RFID and NFC Attacks (OBJ 3 2)  (36.23 MB)
001 Network Attacks (OBJ 3 1)  (29.03 MB)
002 Stress Testing (OBJ 3 1)  (32.37 MB)
003 Exploit Resources (OBJ 3 1)  (43.2 MB)
004 ARP Poisoning (OBJ 3 1)  (28.58 MB)
005 DNS Cache Poisoning (OBJ 3 1)  (28.34 MB)
006 LLMNRNBT-NS Poisoning (OBJ 3 1)  (23.01 MB)
007 MAC Spoofing (OBJ 3 1)  (30.71 MB)
008 VLAN Hopping (OBJ 3 1)  (30.89 MB)
009 NAC Bypass (OBJ 3 1)  (44.79 MB)
010 On-path Attack (OBJ 3 1)  (12.22 MB)
011 Password Attacks (OBJ 3 1)  (81.76 MB)
012 Pass the Hash (OBJ 3 1)  (32.67 MB)
013 Intro to Metasploit (OBJ 3 1)  (115.4 MB)
014 Netcat (OBJ 3 1)  (18.61 MB)
015 Using Netcat (OBJ 3 1)  (22.09 MB)
001 Application Vulnerabilities (OBJ 3 3)  (31.99 MB)
002 Race Conditions (OBJ 3 3)  (27.91 MB)
003 Buffer Overflows (OBJ 3 3)  (53.88 MB)
004 Buffer Overflow Attacks (OBJ 3 3)  (27.42 MB)
005 Authentication and References (OBJ 3 3)  (45.1 MB)
006 Improper Error Handling (OBJ 3 3)  (13.32 MB)
007 Improper Headers (OBJ 3 3)  (21.63 MB)
008 Code Signing (OBJ 3 3)  (14.98 MB)
009 Vulnerable Components (OBJ 3 3)  (105.92 MB)
010 Software Composition (OBJ 3 3)  (78.95 MB)
011 Privilege Escalation (OBJ 3 3)  (15.02 MB)
012 Conducting Privilege Escalation (OBJ 3 3)  (188.29 MB)
001 Application Attacks (OBJ 3 3)  (11.82 MB)
002 Directory Traversals (OBJ 3 3)  (67.02 MB)
003 Dirbuster (OBJ 3 3)  (25.9 MB)
004 Cross-Site Scripting (XSS) (OBJ 3 3)  (25.83 MB)
005 Cross-Site Request Forgery (CSRF) (OBJ 3 3)  (37.37 MB)
006 SQL Injections (OBJ 3 3)  (19.03 MB)
007 Conducting SQL Injections (OBJ 3 3)  (35.94 MB)
008 Burp Suite and SQLmap (OBJ 3 3)  (98.16 MB)
009 OWASP ZAP (OBJ 3 3)  (21.18 MB)
010 XML Injections (OBJ 3 3)  (23.65 MB)
011 Other Injection Attacks (OBJ 3 3)  (9.71 MB)
012 Attacking Web Applications (OBJ 3 3)  (129.88 MB)
001 Cloud Attacks (OBJ 3 4)  (6.53 MB)
002 Attacking the Cloud (OBJ 3 4)  (24.39 MB)
003 Credential Harvesting (OBJ 3 4)  (41.32 MB)
004 Misconfigured Assets (OBJ 3 4)  (59.7 MB)
005 Metadata Service Attack (OBJ 3 4)  (23.67 MB)
006 Software Development Kit (SDK) (OBJ 3 4)  (8.27 MB)
007 Auditing the Cloud (OBJ 3 4)  (25.59 MB)
008 Conducting Cloud Audits (OBJ 3 4)  (105.08 MB)
001 Attacks on Mobile Devices (OBJ 3 5)  (28.24 MB)
002 Enterprise Mobility Management (OBJ 3 5)  (62.11 MB)
003 Deployment Options (OBJ 3 5)  (29.09 MB)
004 Mobile Reconnaissance Concerns (OBJ 3 5)  (69.36 MB)
005 Mobile Device Insecurity (OBJ 3 5)  (115.78 MB)
006 Multifactor Authentication (OBJ 3 5)  (110.92 MB)
007 Mobile Device Attacks (OBJ 3 5)  (21.49 MB)
008 Malware Analysis (OBJ 3 5)  (85.98 MB)
009 Conducting Malware Analysis (OBJ 3 5)  (159.71 MB)
010 Mobile Device Tools (OBJ 3 5)  (19.3 MB)
001 Attacks on Specialized Systems (OBJ 3 5)  (12.46 MB)
002 Internet of Things (IoT) Devices (OBJ 3 5)  (85.22 MB)
003 Internet of Things (IoT) Vulnerabilities (OBJ 3 5)  (44.15 MB)
004 Embedded Systems (OBJ 3 5)  (22.01 MB)
005 ICS and SCADA Devices (OBJ 3 5)  (59.87 MB)
006 ICS Protocols and Vulnerabilities (OBJ 3 5)  (106.06 MB)
007 Data Storage Vulnerabilities (OBJ 3 5)  (42.79 MB)
008 Virtual Environments (OBJ 3 5)  (41.3 MB)
009 Virtual Machine Attacks (OBJ 3 5)  (37.5 MB)
010 Containerization (OBJ 3 5)  (38.78 MB)
001 Post-exploitation (OBJ 3 7)  (8.52 MB)
002 Enumerating the Network (OBJ 3 7)  (24.77 MB)
003 Network Segmentation Testing (OBJ 3 7)  (23.99 MB)
004 Lateral Movement and Pivoting (OBJ 3 7)  (12.91 MB)
005 Pass the Hash (OBJ 3 7)  (39.43 MB)
006 Golden Ticket (OBJ 3 7)  (17.34 MB)
007 Lateral Movement (OBJ 3 7)  (73.36 MB)
008 Pivoting (3 7)  (34.45 MB)
009 Escalating Privileges (OBJ 3 7)  (98.01 MB)
010 Upgrading Restrictive Shells (OBJ 3 7)  (27.12 MB)
001 Detection Avoidance (OBJ 3 7)  (4.75 MB)
002 Trojans and Backdoors (OBJ 3 7)  (26.61 MB)
003 Creating Persistence (OBJ 3 7)  (55.94 MB)
004 Living Off the Land (OBJ 3 7)  (66.63 MB)
005 Data Exfiltration (OBJ 3 7)  (38.42 MB)
006 Covert Channels (OBJ 3 7)  (13.6 MB)
007 Steganography (3 7)  (15.25 MB)
008 Covering Your Tracks (OBJ 3 7)  (30.32 MB)
009 Persistence and Covering Your Tracks (OBJ 3 7)  (69.94 MB)
010 Post-Exploitation Tools (OBJ 3 7)  (8.02 MB)
001 Communication and Reports (OBJ 4 3)  (5.39 MB)
002 Communication Paths (OBJ 4 3)  (35.25 MB)
003 Communication Triggers (OBJ 4 3)  (30.87 MB)
004 Reasons for Communication (OBJ 4 3)  (60.69 MB)
005 Presentation of Findings (4 1 & OBJ 4 3)  (65.26 MB)
006 Report Data Gathering (OBJ 4 1)  (16.02 MB)
007 Written Reports (OBJ 4 1)  (118.8 MB)
008 Common Themes (OBJ 4 1)  (8.65 MB)
009 Securing and Storing Reports (OBJ 4 1)  (21.29 MB)
001 Findings and Remediations (OBJ 4 2)  (11.16 MB)
002 Security Control Categories (OBJ 4 2)  (108.84 MB)
003 Selecting Security Controls (OBJ 4 2)  (38.19 MB)
004 Physical Controls (OBJ 4 2)  (83.26 MB)
005 Operational Controls (OBJ 4 2)  (68.69 MB)
006 Administrative Controls (OBJ 4 2)  (71.7 MB)
007 System Hardening (OBJ 4 2)  (31.3 MB)
008 Secure Coding (OBJ 4 2)  (23.58 MB)
009 Implementing MFA (OBJ 4 2)  (41.16 MB)
010 Digital Certificates (OBJ 4 2)  (55.48 MB)
011 Other Technical Controls (OBJ 4 2)  (9.66 MB)
012 Mitigation Strategies (OBJ 4 2)  (96.04 MB)
001 Post-report Activities (OBJ 4 4)  (12.01 MB)
002 Removing Shells and Tools (OBJ 4 4)  (14.32 MB)
003 Deleting Test Credentials (OBJ 4 4)  (9.61 MB)
004 Destroy Test Data (OBJ 4 4)  (9.34 MB)
005 Client Acceptance (OBJ 4 4)  (23.32 MB)
006 Attestation of Findings (OBJ 4 4)  (25.31 MB)
007 Lessons Learned (OBJ 4 4)  (28.9 MB)
008 Retesting (OBJ 4 4)  (9.82 MB)
001 Scripting Basics (OBJ 5 1 & OBJ 5 2)  (7.2 MB)
002 Scripting Tools (OBJ 5 2)  (49.38 MB)
003 Variables (OBJ 5 1)  (41.3 MB)
004 Loops (OBJ 5 1)  (10.64 MB)
005 Logic Control (OBJ 5 1)  (13.28 MB)
006 Data Structures (OBJ 5 1)  (31.17 MB)
007 Object Oriented Programming (OBJ 5 1)  (25.08 MB)
001 Analyzing Scripts (OBJ 5 2)  (31.27 MB)
002 Coding in Bash (OBJ 5 2)  (110.83 MB)
003 Bash Example (OBJ 5 2)  (18.58 MB)
004 Coding in PowerShell (OBJ 5 2)  (74.7 MB)
005 PowerShell Example (OBJ 5 2)  (26.58 MB)
006 Coding in Python (OBJ 5 2)  (71.71 MB)
007 Python Example (OBJ 5 2)  (15.8 MB)
008 Coding in Perl (OBJ 5 2)  (64.19 MB)
009 Perl Example (OBJ 5 2)  (108.11 MB)
010 Coding in JavaScript (OBJ 5 2)  (115.17 MB)
011 JavaScript Example (OBJ 5 2)  (44.04 MB)
012 Coding in Ruby (OBJ 5 2)  (49.57 MB)
013 Ruby Example (OBJ 5 2)  (19.04 MB)
001 Exploits and Automation (OBJ 5 2)  (9.36 MB)
002 Exploits to download скачать Files (OBJ 5 2)  (14.55 MB)
003 Exploits for Remote Access (OBJ 5 2)  (35.14 MB)
004 Exploits for Enumerating Users (OBJ 5 2)  (16.94 MB)
005 Exploits for Enumerating Assets (OBJ 5 2)  (17.03 MB)
006 Automation in Engagements (OBJ 5 2)  (21.17 MB)
007 Automation with Nmap Scripts (OBJ 5 2)  (12.89 MB)
001 Tool Round-up (OBJ 5 3)  (12.71 MB)
002 OSINT Tools (OBJ 5 3)  (35.94 MB)
003 Scanning Tools (OBJ 5 3)  (38.28 MB)
004 Networking Tools (OBJ 5 3)  (15.83 MB)
005 Wireless Tools (OBJ 5 3)  (28.96 MB)
006 Social Engineering Tools (OBJ 5 3)  (14.51 MB)
007 Remote Access Tools (OBJ 5 3)  (24.25 MB)
008 Credential Testing Tools (OBJ 5 3)  (46.62 MB)
009 Web Application Tools (OBJ 5 3)  (16.23 MB)
010 Cloud Tools (OBJ 5 3)  (11.67 MB)
011 Steganography Tools (OBJ 5 3)  (50.82 MB)
012 Debuggers (OBJ 5 3)  (44.02 MB)
013 Miscellaneous Tools (OBJ 5 3)  (59.18 MB)
001 Conclusion  (136.3 MB)
002 BONUS Where to go from here  (60.46 MB)
[align=center]
Screenshot
https://images2.imgbox.com/2f/16/5CkzKndv_o.jpg

[/align]


RapidGator

Код:
https://rapidgator.net/file/ff459178d5854f2a3705504a1a6ff610/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part1.rar
https://rapidgator.net/file/1f5f633af651f1450878d6dbbe1873ff/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part2.rar
https://rapidgator.net/file/f9066bdf879f0dbf04462f0273686cae/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part3.rar
https://rapidgator.net/file/3819021e363bc3946331dcf50d106930/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part4.rar
https://rapidgator.net/file/ae26c5794cd90b86a4db345394d86891/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part5.rar
https://rapidgator.net/file/7631a02013f7d6de03203dbeea58b147/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part6.rar
https://rapidgator.net/file/632fbdee64bf219a94866a38d6e6cc4e/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part7.rar

FileAxa

Код:
https://fileaxa.com/a7y9o27qeco6/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part1.rar
https://fileaxa.com/i3rrgp5w2wne/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part2.rar
https://fileaxa.com/3gtgshxbzwu7/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part3.rar
https://fileaxa.com/ql13r43et269/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part4.rar
https://fileaxa.com/j8br3l1bw6j8/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part5.rar
https://fileaxa.com/tgnlq8qb7p01/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part6.rar
https://fileaxa.com/ovkse798k6b9/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part7.rar

TurboBit

Код:
https://turbobit.net/06y9mbisahzp/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part1.rar.html
https://turbobit.net/g0qkamtkd8cn/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part2.rar.html
https://turbobit.net/xfw9p5qgi8kl/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part3.rar.html
https://turbobit.net/at3b9ce90djm/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part4.rar.html
https://turbobit.net/hi6wdr898vp0/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part5.rar.html
https://turbobit.net/ezq865ajba5v/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part6.rar.html
https://turbobit.net/3gjuz4b7sx1k/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part7.rar.html