https://img100.pixhost.to/images/617/539499712_359020115_tuto.jpg
5.83 GB | 11min 7s | mp4 | 1920X1080  | 16:9
Genre:eLearning |Language:English


Files Included :
FileName :1  What Is Penetration Testing.mp4 | Size:  (8.59 MB)
FileName :2  The Pentesting Process.mp4 | Size:  (30.18 MB)
FileName :3  Defining A Scope.mp4 | Size:  (14.27 MB)
FileName :4  Defining A Scope - Identifying Targets.mp4 | Size:  (17.45 MB)
FileName :5  Defining A Scope - Rules of Engagement.mp4 | Size:  (18.78 MB)
FileName :6  Types of Agreements.mp4 | Size:  (15.33 MB)
FileName :7  Validation.mp4 | Size:  (6.17 MB)
FileName :1  Shared Responsibilities.mp4 | Size:  (13 MB)
FileName :2  Legal and Ethical Considerations.mp4 | Size:  (11.27 MB)
FileName :3  The Importance of Communications.mp4 | Size:  (20.85 MB)
FileName :4  Peer Review and Secure Distribution.mp4 | Size:  (6 MB)
FileName :5  Calculating Risk and Client Acceptance.mp4 | Size:  (15.8 MB)
FileName :6  Pentesting Standards & Methodologies.mp4 | Size:  (22.37 MB)
FileName :7  Threat Modeling Frameworks.mp4 | Size:  (19.55 MB)
FileName :8  The MITRE ATT&CK Framework.mp4 | Size:  (47.73 MB)
FileName :9  Validation.mp4 | Size:  (6.77 MB)
FileName :1  Pentest Reports.mp4 | Size:  (26.75 MB)
FileName :2  Viewing A Pentest Report.mp4 | Size:  (38.38 MB)
FileName :3  Reporting Considerations.mp4 | Size:  (10.86 MB)
FileName :4  Providing Recommendations - Technical Controls.mp4 | Size:  (13.47 MB)
FileName :5  Providing Recommendations - Administrative Controls.mp4 | Size:  (17.64 MB)
FileName :6  Providing Recommendations - Operational Controls.mp4 | Size:  (13.38 MB)
FileName :7  Providing Recommendations - Physical Controls.mp4 | Size:  (8.13 MB)
FileName :8  Validation.mp4 | Size:  (10.8 MB)
FileName :1  Active vs  Passive Reconnaissance and OSINT.mp4 | Size:  (23.59 MB)
FileName :2  Web-Based OSINT Tools Part 1.mp4 | Size:  (31.85 MB)
FileName :3  Web-Based OSINT Tools Part 2.mp4 | Size:  (33.47 MB)
FileName :4  NSLookupDIG and Maltego.mp4 | Size:  (23.51 MB)
FileName :5  Recon-ng and SpiderFoot.mp4 | Size:  (34.09 MB)
FileName :6  OWASP Amass.mp4 | Size:  (47.01 MB)
FileName :7  DNSenum & DNSrecon.mp4 | Size:  (14.69 MB)
FileName :8  theHarvester.mp4 | Size:  (27.84 MB)
FileName :9  Google Dorking.mp4 | Size:  (11.24 MB)
FileName :10  Validation.mp4 | Size:  (8.17 MB)
FileName :1  Pre-Engagement Discussion.mp4 | Size:  (15.55 MB)
FileName :2  DNS Enumeration.mp4 | Size:  (53.62 MB)
FileName :3  Email Enumeration.mp4 | Size:  (20.9 MB)
FileName :4  Password Enumeration.mp4 | Size:  (21.59 MB)
FileName :5  Social Media Snooping.mp4 | Size:  (38.63 MB)
FileName :6  Job Posting and Business Information Enumeration.mp4 | Size:  (40.93 MB)
FileName :7  Validation.mp4 | Size:  (4.9 MB)
FileName :1  Active Enumeration of Targets.mp4 | Size:  (8.13 MB)
FileName :2  Active Enumeration Tools.mp4 | Size:  (20.2 MB)
FileName :3  What Are We Looking For.mp4 | Size:  (25.27 MB)
FileName :4  What Do We Do With Our Findings.mp4 | Size:  (24.92 MB)
FileName :5  Port Scanners.mp4 | Size:  (51.64 MB)
FileName :6  Lab Introduction.mp4 | Size:  (19.06 MB)
FileName :7  Validation.mp4 | Size:  (6.22 MB)
FileName :1  The TCP 3-Way Handshake.mp4 | Size:  (12.12 MB)
FileName :2  Ports and Sockets.mp4 | Size:  (11.75 MB)
FileName :3  A Basic NMAP Scan.mp4 | Size:  (23.3 MB)
FileName :4  NMAP and ICMP.mp4 | Size:  (15.13 MB)
FileName :5  Scanning TCP and UDP Ports.mp4 | Size:  (21.38 MB)
FileName :6  Identifying Host Attributes.mp4 | Size:  (37.61 MB)
FileName :7  NMAP Scripting Engine (NSE).mp4 | Size:  (19.48 MB)
FileName :8  Bypassing Firewalls With NMAP.mp4 | Size:  (13.44 MB)
FileName :9  Validation.mp4 | Size:  (7.62 MB)
FileName :1  FTP Enumeration.mp4 | Size:  (34.27 MB)
FileName :2  SSH Enumeration.mp4 | Size:  (23.93 MB)
FileName :3  Telnet Enumeration.mp4 | Size:  (13.94 MB)
FileName :4  SMTP Enumeration.mp4 | Size:  (34.74 MB)
FileName :5  DNS Enumeration.mp4 | Size:  (32.51 MB)
FileName :6  SNMP Enumeration.mp4 | Size:  (61.48 MB)
FileName :7  Validation.mp4 | Size:  (29.56 MB)
FileName :1  R Services.mp4 | Size:  (13.62 MB)
FileName :2  Java RMI (Remote Method Invocation).mp4 | Size:  (19.23 MB)
FileName :3  Bind shells.mp4 | Size:  (7.17 MB)
FileName :4  RPC  NFS.mp4 | Size:  (31.87 MB)
FileName :5  MySQL.mp4 | Size:  (29.76 MB)
FileName :6  distccd v1.mp4 | Size:  (14.28 MB)
FileName :7  Postgresql.mp4 | Size:  (15.97 MB)
FileName :8  VNC (Virtual Network Computing).mp4 | Size:  (26.53 MB)
FileName :9  IRC (Internet Relay Chat).mp4 | Size:  (17.32 MB)
FileName :10  Validation.mp4 | Size:  (10.01 MB)
FileName :1  LDAP Enumeration.mp4 | Size:  (56.08 MB)
FileName :2  Server Message Block (SMB) Part 1 Video 1.mp4 | Size:  (42.45 MB)
FileName :3  Server Message Block (SMB) Part 1 Video 2.mp4 | Size:  (26.81 MB)
FileName :4  Server Message Block (SMB) Part 2 Video 1.mp4 | Size:  (36.39 MB)
FileName :5  Server Message Block (SMB) Part 2 Video 2.mp4 | Size:  (16.17 MB)
FileName :6  CUPS Enumeration.mp4 | Size:  (28.78 MB)
FileName :7  RDP Enumeration.mp4 | Size:  (42.42 MB)
FileName :8  Validation.mp4 | Size:  (23.77 MB)
FileName :1  Introduction To Web Communications.mp4 | Size:  (21.92 MB)
FileName :2  HTTP Methods In Action.mp4 | Size:  (28.98 MB)
FileName :3  Banner Grabbing.mp4 | Size:  (26.3 MB)
FileName :4  Content Management Systems (CMS) and Frameworks.mp4 | Size:  (5.6 MB)
FileName :5  Identifying Web Technologies In Use.mp4 | Size:  (42.82 MB)
FileName :6  Website Enumeration With Fuzzing.mp4 | Size:  (27.13 MB)
FileName :7  Challenge solution video.mp4 | Size:  (31.01 MB)
FileName :1  Detecting Web Application Firewalls (WAFs).mp4 | Size:  (8.27 MB)
FileName :2  HTMLWeb Scraping.mp4 | Size:  (33.45 MB)
FileName :3  Using Burp Suite To Enumerate Web Services.mp4 | Size:  (28.87 MB)
FileName :4  Enumerating Web Services With OWASP ZAP Nugget 1.mp4 | Size:  (18.05 MB)
FileName :5  Enumerating Web Services With OWASP ZAP Nugget 2.mp4 | Size:  (23.47 MB)
FileName :6  Enumerating Web Services With OWASP ZAP Nugget 3.mp4 | Size:  (30.54 MB)
FileName :7  Validation.mp4 | Size:  (10.77 MB)
FileName :1  Scripting Basics.mp4 | Size:  (23.54 MB)
FileName :2  Working With Scripts.mp4 | Size:  (23.56 MB)
FileName :3  Analyzing PING Scripts - BASH.mp4 | Size:  (19.1 MB)
FileName :4  Analyzing PING Scripts - PowerShell.mp4 | Size:  (10.63 MB)
FileName :5  Analyzing PING Scripts - Python.mp4 | Size:  (18.11 MB)
FileName :6  Downloading Files With Scripts.mp4 | Size:  (13.37 MB)
FileName :7  Using Automation With Scripts.mp4 | Size:  (37.21 MB)
FileName :8  Validation.mp4 | Size:  (16.16 MB)
FileName :1  Security Testing Methodologies - Containers.mp4 | Size:  (9.58 MB)
FileName :2  Security Testing Methodologies - Software.mp4 | Size:  (17.72 MB)
FileName :3  Scanning Methods.mp4 | Size:  (22.53 MB)
FileName :4  Scanning Methods for Industrial Control Systems (ICS).mp4 | Size:  (16.41 MB)
FileName :5  Web App Vulnerability Scanning With Nikto.mp4 | Size:  (52.83 MB)
FileName :6  Finding Secrets With Trufflehog.mp4 | Size:  (30.66 MB)
FileName :7  Validation.mp4 | Size:  (15.26 MB)
FileName :1  Getting To Know Bloodhound.mp4 | Size:  (48.29 MB)
FileName :2  Analyzing Active Directory With BloodHound.mp4 | Size:  (26.19 MB)
FileName :3  Vulnerability Scanning With Nessus.mp4 | Size:  (33.78 MB)
FileName :4  The PowerSploit Framework.mp4 | Size:  (12.73 MB)
FileName :5  Scanning Containers With Trivy.mp4 | Size:  (13.36 MB)
FileName :6  Physical Security Controls.mp4 | Size:  (18.42 MB)
FileName :7  Validation.mp4 | Size:  (21.42 MB)
FileName :1  Intro To The Metasploit Framework (MSF).mp4 | Size:  (15.95 MB)
FileName :2  MSF Startup and Workspaces.mp4 | Size:  (17.74 MB)
FileName :3  Metasploit Modules.mp4 | Size:  (40.93 MB)
FileName :4  Metasploit Options and Payloads.mp4 | Size:  (27.22 MB)
FileName :5  Managing Metasploit Sessions.mp4 | Size:  (33.22 MB)
FileName :6  Using Post Modules in MSF.mp4 | Size:  (41.59 MB)
FileName :7  The MSF Meterpreter Shell.mp4 | Size:  (39.82 MB)
FileName :8  Validation.mp4 | Size:  (22.97 MB)
FileName :1  Target Prioritization Nugget 1.mp4 | Size:  (21.08 MB)
FileName :2  Target Prioritization Nugget 2.mp4 | Size:  (12.5 MB)
FileName :3  Selecting A Strategy.mp4 | Size:  (16.67 MB)
FileName :4  Attack Types and Tools Pt 1.mp4 | Size:  (23.06 MB)
FileName :5  Attack Types and Tools Pt 2.mp4 | Size:  (18.29 MB)
FileName :6  Attack Types and Tools Pt 3.mp4 | Size:  (14.36 MB)
FileName :7  Attack Types and Tools Pt 4.mp4 | Size:  (8.54 MB)
FileName :8  Validation.mp4 | Size:  (6.27 MB)
FileName :1  MFA Fatigue and Hashes.mp4 | Size:  (27.64 MB)
FileName :2  Hash Attacks, Kerberos Attacks and LDAP Injection.mp4 | Size:  (28.99 MB)
FileName :3  Getting To Know NetExec (Previously CrackMapExec).mp4 | Size:  (47.44 MB)
FileName :4  Dumping Hashes On Windows.mp4 | Size:  (40.14 MB)
FileName :5  Pass-The-Hash Attacks.mp4 | Size:  (37.35 MB)
FileName :6  Validation.mp4 | Size:  (36.12 MB)
FileName :1  Credential Attacks.mp4 | Size:  (30.14 MB)
FileName :2  Creating Custom Wordlists.mp4 | Size:  (19.86 MB)
FileName :3  Brute Force Credential Attacks.mp4 | Size:  (20.47 MB)
FileName :4  Dumping Hashes On Linux.mp4 | Size:  (32.77 MB)
FileName :5  Cracking Hashes.mp4 | Size:  (47.36 MB)
FileName :6  Validation.mp4 | Size:  (25.99 MB)
FileName :1  Windows Privilege Escalation (privesc).mp4 | Size:  (25.3 MB)
FileName :2  Linux Privilege Escalation (privesc).mp4 | Size:  (30.58 MB)
FileName :3  Host Based Attacks Pt 1.mp4 | Size:  (27.56 MB)
FileName :4  Host Based Attacks Pt 2.mp4 | Size:  (13.18 MB)
FileName :5  Privesc Using SUIDGUID.mp4 | Size:  (26.8 MB)
FileName :6  Validation.mp4 | Size:  (14.23 MB)
FileName :1  OWASP Top 10 (1 thru 3).mp4 | Size:  (74.25 MB)
FileName :2  OWASP Top 10 (4 thru 6).mp4 | Size:  (47.3 MB)
FileName :3  OWASP Top 10 (7 thru 10).mp4 | Size:  (56.74 MB)
FileName :4  Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4 | Size:  (40.33 MB)
FileName :5  SQL Injection Attacks.mp4 | Size:  (39.21 MB)
FileName :6  File Inclusion Vulnerabilities.mp4 | Size:  (52.64 MB)
FileName :7  Additional Web App Vulnerabilities and Attacks.mp4 | Size:  (40.36 MB)
FileName :1  Brute Force Attacks Using OWASP ZAP.mp4 | Size:  (21.12 MB)
FileName :2  SQL Injection (SQLi) Attacks Using SQLmap.mp4 | Size:  (37.48 MB)
FileName :3  Local and Remote File Inclusion Attacks.mp4 | Size:  (34.21 MB)
FileName :4  Cross Site Scripting (XSS) Attacks.mp4 | Size:  (16.62 MB)
FileName :5  Validation.mp4 | Size:  (50.24 MB)
FileName :1  All About Shells.mp4 | Size:  (24.42 MB)
FileName :2  Bind and Reverse Shells.mp4 | Size:  (22.99 MB)
FileName :3  Web Shells.mp4 | Size:  (18.83 MB)
FileName :4  Shell One-Liners.mp4 | Size:  (20.14 MB)
FileName :5  Creating A Meterpreter Shell.mp4 | Size:  (17.74 MB)
FileName :6  Web Server Log Poisoning For A Shell.mp4 | Size:  (44.12 MB)
FileName :7  Validation.mp4 | Size:  (34.58 MB)
FileName :1  Attacks On Cloud Services.mp4 | Size:  (28.98 MB)
FileName :2  Exploiting Misconfigurations In AWS S3 Buckets.mp4 | Size:  (47.27 MB)
FileName :3  Performing An Account Takeover With Pacu.mp4 | Size:  (47.04 MB)
FileName :4  Enumeration With ScoutSuite.mp4 | Size:  (16.06 MB)
FileName :1  Wireless and Mobile Device Attacks and Tools.mp4 | Size:  (56.28 MB)
FileName :2  Sniffing Wireless Data.mp4 | Size:  (59.86 MB)
FileName :3  Wireless Analysis With Kismet.mp4 | Size:  (58.33 MB)
FileName :4  Wireless Deauthentication Attacks.mp4 | Size:  (38.78 MB)
FileName :5  Cracking WPA2 Preshared Keys.mp4 | Size:  (36.1 MB)
FileName :6  Wireless Evil Twin Attack.mp4 | Size:  (64.22 MB)
FileName :7  Automated Wifi Attack Tools.mp4 | Size:  (63.39 MB)
FileName :8  Section Review.mp4 | Size:  (27.66 MB)
FileName :1  Social Engineering Attack Anatomy.mp4 | Size:  (26.23 MB)
FileName :2  Social Engineering Attacks.mp4 | Size:  (23.13 MB)
FileName :3  Social Engineering Tools.mp4 | Size:  (21.73 MB)
FileName :4  The Social Engineering Toolkit.mp4 | Size:  (30.92 MB)
FileName :5  WifiPhisher.mp4 | Size:  (7.66 MB)
FileName :6  GoPhish.mp4 | Size:  (27.89 MB)
FileName :1  Mobile Device Attacks.mp4 | Size:  (38.51 MB)
FileName :2  Mobile Device Vulnerabilities.mp4 | Size:  (63.54 MB)
FileName :3  Mobile Security Tools.mp4 | Size:  (35.96 MB)
FileName :4  Internet of Things (IoT) Devices.mp4 | Size:  (59.56 MB)
FileName :5  Data Storage System Vulnerabilities.mp4 | Size:  (50.05 MB)
FileName :6  SCADA, IIoT and ICS Vulnerabilities.mp4 | Size:  (43.81 MB)
FileName :7  Virtual Environment Vulnerabilities.mp4 | Size:  (41.4 MB)
FileName :8  Attacks Against Artificial Intelligence (AI).mp4 | Size:  (19.58 MB)
FileName :1  PowerShell Enumeration and Data Manipulation In BASH.mp4 | Size:  (14.78 MB)
FileName :2  Linux On-Host Enumeration.mp4 | Size:  (50.76 MB)
FileName :3  Scapy and Impacket.mp4 | Size:  (27.11 MB)
FileName :4  Windows Active Directory Enumeration With PowerView.mp4 | Size:  (37.47 MB)
FileName :5  Breach and Attack Simulation (BAS).mp4 | Size:  (10.29 MB)
FileName :6  Validation.mp4 | Size:  (49.97 MB)
FileName :1  Pivoting and Lateral Movement.mp4 | Size:  (19.56 MB)
FileName :2  Pivoting With Chisel.mp4 | Size:  (38.57 MB)
FileName :3  Lateral Movement With Chisel and Proxychains.mp4 | Size:  (38.12 MB)
FileName :4  Port Forwarding With Chisel.mp4 | Size:  (23.51 MB)
FileName :5  Pivoting With Metasploit.mp4 | Size:  (32.09 MB)
FileName :6  Port Forwarding With Metasploit.mp4 | Size:  (9.07 MB)
FileName :7  Validation.mp4 | Size:  (18.27 MB)
FileName :1  What Is Persistence.mp4 | Size:  (22.84 MB)
FileName :2  Setup Persistence On Linux Using Cron Jobs.mp4 | Size:  (22.33 MB)
FileName :3  Setup Persistence On Windows Using Scheduled Tasks.mp4 | Size:  (30.46 MB)
FileName :4  Setup Persistence On Windows Using An MSF Payload.mp4 | Size:  (44.44 MB)
FileName :5  Validation.mp4 | Size:  (23.51 MB)
FileName :1  Data Exfiltration.mp4 | Size:  (19.95 MB)
FileName :2  Data Exfiltration On Linux.mp4 | Size:  (33.54 MB)
FileName :3  Data Exfiltration On Windows.mp4 | Size:  (24.86 MB)
FileName :4  Cleanup and Restoration Activities.mp4 | Size:  (13.68 MB)
FileName :5  Covering Your Tracks.mp4 | Size:  (22.28 MB)
FileName :6  Validation.mp4 | Size:  (16.27 MB)]
Screenshot
https://images2.imgbox.com/fa/e2/7FwNAZUe_o.jpg



NitroFlare

Код:
https://nitroflare.com/view/208C39CC9175A16/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part1.rar
https://nitroflare.com/view/D6E0B522FB5191A/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part2.rar
https://nitroflare.com/view/25D8425CDC5BA1D/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part3.rar
https://nitroflare.com/view/9B0D72F9A8E21A8/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part4.rar
https://nitroflare.com/view/45DD8C07FD6D632/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part5.rar
https://nitroflare.com/view/883DD4DA40516FD/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part6.rar

DDownload

Код:
https://ddownload.com/ig1q1831zvj3/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part1.rar
https://ddownload.com/be3c7tf7up0f/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part2.rar
https://ddownload.com/rnzytjgn7gac/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part3.rar
https://ddownload.com/966xe0t7xv7n/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part4.rar
https://ddownload.com/exoquuvvxmdj/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part5.rar
https://ddownload.com/r9ow03ukh429/CBTNuggets.-.CompTIA.PenTest%2B.PT0-003.Online.Training.part6.rar