11.6 GB | 00:12:18 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
001 Welcome (266.18 MB)
003 Exam Tips (83.49 MB)
001 Planning an Engagement (OBJ 1 1, 1 2, and 1 3) (10.38 MB)
002 Risk (OBJ 1 2) (92.74 MB)
003 Risk Handling (OBJ 1 2) (71.07 MB)
004 Controls (OBJ 1 2) (57 MB)
005 PenTest Methodologies (OBJ 1 2) (27.15 MB)
006 PenTest Standards (OBJ 1 2) (38.42 MB)
007 Planning a Test (OBJ 1 2) (66.62 MB)
008 Legal Concepts (OBJ 1 1) (58.63 MB)
009 Regulatory Compliance (OBJ 1 1) (104.54 MB)
010 Professionalism (OBJ 1 3) (67.46 MB)
001 Scoping an Engagement (OBJ 1 1, 1 2, and 1 3) (10.49 MB)
002 Defining the Scope (OBJ 1 2) (62.01 MB)
003 Adversary Emulation (OBJ 1 2) (116.03 MB)
004 Target List (OBJ 1 2) (79.32 MB)
005 Identifying Restrictions (OBJ 1 1) (81.25 MB)
006 Rules of Engagement (OBJ 1 2) (82.72 MB)
007 Assessment Types (OBJ 1 3) (49.11 MB)
008 Validating the Scope (OBJ 1 2) (42.03 MB)
009 Limitations and Permission (OBJ 1 1 and 1 3) (57.14 MB)
010 Build a Virtual Lab (101.62 MB)
001 Passive Reconnaissance (OBJ 2 1) (30.39 MB)
002 Information Gathering (OBJ 2 1) (40.66 MB)
003 Open-Source Intelligence (OSINT) (OBJ 2 1) (47.01 MB)
004 Social Media Scraping (OBJ 2 1) (68.67 MB)
005 OSINT Tools (OBJ 2 1) (61.4 MB)
006 Using OSINT Tools (OBJ 2 1) (170.22 MB)
007 DNS Information (OBJ 2 1) (58.05 MB)
008 Reconnaissance with CentralOps (OBJ 2 1) (105.37 MB)
009 Public Repositories (OBJ2 1) (32.68 MB)
010 Search Engine Analysis (OBJ 2 1) (15.96 MB)
011 URL Analysis (OBJ 2 1) (96.21 MB)
012 Cryptographic Flaws (OBJ 2 1) (62.81 MB)
013 CWE & CVE (OBJ 2 1) (37.3 MB)
001 Active Reconnaissance (OBJ 2 2 and 2 3) (10.24 MB)
002 Scanning and Enumeration (OBJ 2 2 and 2 3) (43.71 MB)
003 Conducting Enumeration (OBJ 2 3) (124.42 MB)
004 Other Enumeration (OBJ 2 2 and 2 3) (26.98 MB)
005 Website Reconnaissance (OBJ 2 3) (49.57 MB)
006 Detecting and Evading Defenses (OBJ 2 2) (50.06 MB)
007 Packet Crafting (OBJ 2 2) (59.58 MB)
008 Eavesdropping (OBJ 2 2) (103.09 MB)
009 Wardriving (OBJ 2 2) (81.21 MB)
010 DNS and ARP Analysis (OBJ 2 3) (63.15 MB)
011 Network Traffic Analysis (OBJ 2 3) (170.55 MB)
001 Vulnerability Scanning (OBJ 2 3 and 2 4) (8.64 MB)
002 Vulnerability Lifecycle (OBJ 2 3 and 2 4) (48.5 MB)
003 Vulnerability Scans (OBJ 2 3 and 2 4) (67.1 MB)
004 Scanning Considerations (OBJ 2 3 and 2 4) (75.29 MB)
005 Nessus Scanning (OBJ 2 3 and 2 4) (73.92 MB)
006 OpenVas Scanning (OBJ 2 3 and 2 4) (77.08 MB)
007 Nikto Scanning (OBJ 2 3 and 2 4) (64.58 MB)
001 Nmap (OBJ 2 3 and 2 4) (7.67 MB)
002 Nmap Discovery Scans (OBJ 2 3 and 2 4) (44.11 MB)
003 Nmap Port Scans (OBJ 2 3 and 2 4) (27.56 MB)
004 Nmap Fingerprinting (OBJ 2 3 and 2 4) (24.45 MB)
005 Using Nmap (OBJ 2 3 and 2 4) (86.37 MB)
006 Nmap Scripting Engine (OBJ 2 3 and 2 4) (170.28 MB)
001 Social Engineering and Physical Attacks (OBJ 3 6) (20.74 MB)
002 Methods of Influence (OBJ 3 6) (97.99 MB)
003 Social Engineering (OBJ 3 6) (114.36 MB)
004 Phishing Campaigns (OBJ 3 6) (24.06 MB)
005 Social Engineering Toolkit (OBJ 3 6) (104.09 MB)
006 Pretexting (OBJ 3 6) (47.79 MB)
007 Baiting Victims (OBJ 3 6) (51.89 MB)
008 Impersonation (OBJ 3 6) (39.84 MB)
009 Physical Security (OBJ 3 6) (199.42 MB)
010 Lock Picking (OBJ 3 6) (9.71 MB)
011 Physical Attacks (OBJ 3 6) (29.51 MB)
012 Social Engineering Tools (OBJ 3 6) (34.73 MB)
001 Wireless Attacks (OBJ 3 2) (15.28 MB)
002 Wireless Security (OBJ 3 2) (54.46 MB)
003 Bypassing MAC Filtering (OBJ 3 2) (19.99 MB)
004 Signal Exploitation (OBJ 3 2) (54.64 MB)
005 WEP Hacking (OBJ 3 2) (42.01 MB)
006 WPAWPA2 Hacking (OBJ 3 2) (31 MB)
007 WPS PIN Attacks (OBJ 3 2) (80.68 MB)
008 Evil Twins (OBJ 3 2) (30.62 MB)
009 On-path and Relay Attacks (OBJ 3 2) (10.63 MB)
010 Bluetooth Attacks (OBJ 3 2) (43.52 MB)
011 RFID and NFC Attacks (OBJ 3 2) (36.23 MB)
001 Network Attacks (OBJ 3 1) (29.03 MB)
002 Stress Testing (OBJ 3 1) (32.37 MB)
003 Exploit Resources (OBJ 3 1) (43.2 MB)
004 ARP Poisoning (OBJ 3 1) (28.58 MB)
005 DNS Cache Poisoning (OBJ 3 1) (28.34 MB)
006 LLMNRNBT-NS Poisoning (OBJ 3 1) (23.01 MB)
007 MAC Spoofing (OBJ 3 1) (30.71 MB)
008 VLAN Hopping (OBJ 3 1) (30.89 MB)
009 NAC Bypass (OBJ 3 1) (44.79 MB)
010 On-path Attack (OBJ 3 1) (12.22 MB)
011 Password Attacks (OBJ 3 1) (81.76 MB)
012 Pass the Hash (OBJ 3 1) (32.67 MB)
013 Intro to Metasploit (OBJ 3 1) (115.4 MB)
014 Netcat (OBJ 3 1) (18.61 MB)
015 Using Netcat (OBJ 3 1) (22.09 MB)
001 Application Vulnerabilities (OBJ 3 3) (31.99 MB)
002 Race Conditions (OBJ 3 3) (27.91 MB)
003 Buffer Overflows (OBJ 3 3) (53.88 MB)
004 Buffer Overflow Attacks (OBJ 3 3) (27.42 MB)
005 Authentication and References (OBJ 3 3) (45.1 MB)
006 Improper Error Handling (OBJ 3 3) (13.32 MB)
007 Improper Headers (OBJ 3 3) (21.63 MB)
008 Code Signing (OBJ 3 3) (14.98 MB)
009 Vulnerable Components (OBJ 3 3) (105.92 MB)
010 Software Composition (OBJ 3 3) (78.95 MB)
011 Privilege Escalation (OBJ 3 3) (15.02 MB)
012 Conducting Privilege Escalation (OBJ 3 3) (188.29 MB)
001 Application Attacks (OBJ 3 3) (11.82 MB)
002 Directory Traversals (OBJ 3 3) (67.02 MB)
003 Dirbuster (OBJ 3 3) (25.9 MB)
004 Cross-Site Scripting (XSS) (OBJ 3 3) (25.83 MB)
005 Cross-Site Request Forgery (CSRF) (OBJ 3 3) (37.37 MB)
006 SQL Injections (OBJ 3 3) (19.03 MB)
007 Conducting SQL Injections (OBJ 3 3) (35.94 MB)
008 Burp Suite and SQLmap (OBJ 3 3) (98.16 MB)
009 OWASP ZAP (OBJ 3 3) (21.18 MB)
010 XML Injections (OBJ 3 3) (23.65 MB)
011 Other Injection Attacks (OBJ 3 3) (9.71 MB)
012 Attacking Web Applications (OBJ 3 3) (129.88 MB)
001 Cloud Attacks (OBJ 3 4) (6.53 MB)
002 Attacking the Cloud (OBJ 3 4) (24.39 MB)
003 Credential Harvesting (OBJ 3 4) (41.32 MB)
004 Misconfigured Assets (OBJ 3 4) (59.7 MB)
005 Metadata Service Attack (OBJ 3 4) (23.67 MB)
006 Software Development Kit (SDK) (OBJ 3 4) (8.27 MB)
007 Auditing the Cloud (OBJ 3 4) (25.59 MB)
008 Conducting Cloud Audits (OBJ 3 4) (105.08 MB)
001 Attacks on Mobile Devices (OBJ 3 5) (28.24 MB)
002 Enterprise Mobility Management (OBJ 3 5) (62.11 MB)
003 Deployment Options (OBJ 3 5) (29.09 MB)
004 Mobile Reconnaissance Concerns (OBJ 3 5) (69.36 MB)
005 Mobile Device Insecurity (OBJ 3 5) (115.78 MB)
006 Multifactor Authentication (OBJ 3 5) (110.92 MB)
007 Mobile Device Attacks (OBJ 3 5) (21.49 MB)
008 Malware Analysis (OBJ 3 5) (85.98 MB)
009 Conducting Malware Analysis (OBJ 3 5) (159.71 MB)
010 Mobile Device Tools (OBJ 3 5) (19.3 MB)
001 Attacks on Specialized Systems (OBJ 3 5) (12.46 MB)
002 Internet of Things (IoT) Devices (OBJ 3 5) (85.22 MB)
003 Internet of Things (IoT) Vulnerabilities (OBJ 3 5) (44.15 MB)
004 Embedded Systems (OBJ 3 5) (22.01 MB)
005 ICS and SCADA Devices (OBJ 3 5) (59.87 MB)
006 ICS Protocols and Vulnerabilities (OBJ 3 5) (106.06 MB)
007 Data Storage Vulnerabilities (OBJ 3 5) (42.79 MB)
008 Virtual Environments (OBJ 3 5) (41.3 MB)
009 Virtual Machine Attacks (OBJ 3 5) (37.5 MB)
010 Containerization (OBJ 3 5) (38.78 MB)
001 Post-exploitation (OBJ 3 7) (8.52 MB)
002 Enumerating the Network (OBJ 3 7) (24.77 MB)
003 Network Segmentation Testing (OBJ 3 7) (23.99 MB)
004 Lateral Movement and Pivoting (OBJ 3 7) (12.91 MB)
005 Pass the Hash (OBJ 3 7) (39.43 MB)
006 Golden Ticket (OBJ 3 7) (17.34 MB)
007 Lateral Movement (OBJ 3 7) (73.36 MB)
008 Pivoting (3 7) (34.45 MB)
009 Escalating Privileges (OBJ 3 7) (98.01 MB)
010 Upgrading Restrictive Shells (OBJ 3 7) (27.12 MB)
001 Detection Avoidance (OBJ 3 7) (4.75 MB)
002 Trojans and Backdoors (OBJ 3 7) (26.61 MB)
003 Creating Persistence (OBJ 3 7) (55.94 MB)
004 Living Off the Land (OBJ 3 7) (66.63 MB)
005 Data Exfiltration (OBJ 3 7) (38.42 MB)
006 Covert Channels (OBJ 3 7) (13.6 MB)
007 Steganography (3 7) (15.25 MB)
008 Covering Your Tracks (OBJ 3 7) (30.32 MB)
009 Persistence and Covering Your Tracks (OBJ 3 7) (69.94 MB)
010 Post-Exploitation Tools (OBJ 3 7) (8.02 MB)
001 Communication and Reports (OBJ 4 3) (5.39 MB)
002 Communication Paths (OBJ 4 3) (35.25 MB)
003 Communication Triggers (OBJ 4 3) (30.87 MB)
004 Reasons for Communication (OBJ 4 3) (60.69 MB)
005 Presentation of Findings (4 1 & OBJ 4 3) (65.26 MB)
006 Report Data Gathering (OBJ 4 1) (16.02 MB)
007 Written Reports (OBJ 4 1) (118.8 MB)
008 Common Themes (OBJ 4 1) (8.65 MB)
009 Securing and Storing Reports (OBJ 4 1) (21.29 MB)
001 Findings and Remediations (OBJ 4 2) (11.16 MB)
002 Security Control Categories (OBJ 4 2) (108.84 MB)
003 Selecting Security Controls (OBJ 4 2) (38.19 MB)
004 Physical Controls (OBJ 4 2) (83.26 MB)
005 Operational Controls (OBJ 4 2) (68.69 MB)
006 Administrative Controls (OBJ 4 2) (71.7 MB)
007 System Hardening (OBJ 4 2) (31.3 MB)
008 Secure Coding (OBJ 4 2) (23.58 MB)
009 Implementing MFA (OBJ 4 2) (41.16 MB)
010 Digital Certificates (OBJ 4 2) (55.48 MB)
011 Other Technical Controls (OBJ 4 2) (9.66 MB)
012 Mitigation Strategies (OBJ 4 2) (96.04 MB)
001 Post-report Activities (OBJ 4 4) (12.01 MB)
002 Removing Shells and Tools (OBJ 4 4) (14.32 MB)
003 Deleting Test Credentials (OBJ 4 4) (9.61 MB)
004 Destroy Test Data (OBJ 4 4) (9.34 MB)
005 Client Acceptance (OBJ 4 4) (23.32 MB)
006 Attestation of Findings (OBJ 4 4) (25.31 MB)
007 Lessons Learned (OBJ 4 4) (28.9 MB)
008 Retesting (OBJ 4 4) (9.82 MB)
001 Scripting Basics (OBJ 5 1 & OBJ 5 2) (7.2 MB)
002 Scripting Tools (OBJ 5 2) (49.38 MB)
003 Variables (OBJ 5 1) (41.3 MB)
004 Loops (OBJ 5 1) (10.64 MB)
005 Logic Control (OBJ 5 1) (13.28 MB)
006 Data Structures (OBJ 5 1) (31.17 MB)
007 Object Oriented Programming (OBJ 5 1) (25.08 MB)
001 Analyzing Scripts (OBJ 5 2) (31.27 MB)
002 Coding in Bash (OBJ 5 2) (110.83 MB)
003 Bash Example (OBJ 5 2) (18.58 MB)
004 Coding in PowerShell (OBJ 5 2) (74.7 MB)
005 PowerShell Example (OBJ 5 2) (26.58 MB)
006 Coding in Python (OBJ 5 2) (71.71 MB)
007 Python Example (OBJ 5 2) (15.8 MB)
008 Coding in Perl (OBJ 5 2) (64.19 MB)
009 Perl Example (OBJ 5 2) (108.11 MB)
010 Coding in JavaScript (OBJ 5 2) (115.17 MB)
011 JavaScript Example (OBJ 5 2) (44.04 MB)
012 Coding in Ruby (OBJ 5 2) (49.57 MB)
013 Ruby Example (OBJ 5 2) (19.04 MB)
001 Exploits and Automation (OBJ 5 2) (9.36 MB)
002 Exploits to download скачать Files (OBJ 5 2) (14.55 MB)
003 Exploits for Remote Access (OBJ 5 2) (35.14 MB)
004 Exploits for Enumerating Users (OBJ 5 2) (16.94 MB)
005 Exploits for Enumerating Assets (OBJ 5 2) (17.03 MB)
006 Automation in Engagements (OBJ 5 2) (21.17 MB)
007 Automation with Nmap Scripts (OBJ 5 2) (12.89 MB)
001 Tool Round-up (OBJ 5 3) (12.71 MB)
002 OSINT Tools (OBJ 5 3) (35.94 MB)
003 Scanning Tools (OBJ 5 3) (38.28 MB)
004 Networking Tools (OBJ 5 3) (15.83 MB)
005 Wireless Tools (OBJ 5 3) (28.96 MB)
006 Social Engineering Tools (OBJ 5 3) (14.51 MB)
007 Remote Access Tools (OBJ 5 3) (24.25 MB)
008 Credential Testing Tools (OBJ 5 3) (46.62 MB)
009 Web Application Tools (OBJ 5 3) (16.23 MB)
010 Cloud Tools (OBJ 5 3) (11.67 MB)
011 Steganography Tools (OBJ 5 3) (50.82 MB)
012 Debuggers (OBJ 5 3) (44.02 MB)
013 Miscellaneous Tools (OBJ 5 3) (59.18 MB)
001 Conclusion (136.3 MB)
002 BONUS Where to go from here (60.46 MB)
[align=center]
Screenshot
[/align]
RapidGator
https://rapidgator.net/file/ff459178d5854f2a3705504a1a6ff610/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part1.rar https://rapidgator.net/file/1f5f633af651f1450878d6dbbe1873ff/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part2.rar https://rapidgator.net/file/f9066bdf879f0dbf04462f0273686cae/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part3.rar https://rapidgator.net/file/3819021e363bc3946331dcf50d106930/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part4.rar https://rapidgator.net/file/ae26c5794cd90b86a4db345394d86891/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part5.rar https://rapidgator.net/file/7631a02013f7d6de03203dbeea58b147/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part6.rar https://rapidgator.net/file/632fbdee64bf219a94866a38d6e6cc4e/Udemy.-.CompTIA.Pentest_.Ethical.Hacking.Course..Practice.Exam.part7.rar
FileAxa
https://fileaxa.com/a7y9o27qeco6/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part1.rar https://fileaxa.com/i3rrgp5w2wne/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part2.rar https://fileaxa.com/3gtgshxbzwu7/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part3.rar https://fileaxa.com/ql13r43et269/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part4.rar https://fileaxa.com/j8br3l1bw6j8/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part5.rar https://fileaxa.com/tgnlq8qb7p01/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part6.rar https://fileaxa.com/ovkse798k6b9/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part7.rar
TurboBit
https://turbobit.net/06y9mbisahzp/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part1.rar.html https://turbobit.net/g0qkamtkd8cn/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part2.rar.html https://turbobit.net/xfw9p5qgi8kl/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part3.rar.html https://turbobit.net/at3b9ce90djm/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part4.rar.html https://turbobit.net/hi6wdr898vp0/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part5.rar.html https://turbobit.net/ezq865ajba5v/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part6.rar.html https://turbobit.net/3gjuz4b7sx1k/Udemy.-.CompTIA.Pentest%2B.Ethical.Hacking.Course..Practice.Exam.part7.rar.html