Enterprise Penetration Testing and Continuous Monitoring

磁链地址复制复制磁链成功
磁链详情
文件数目:110个文件
文件大小:1.42 GB
收录时间:2023-05-20
访问次数:1
相关内容:EnterprisePenetrationTestingContinuousMonitoring
文件meta
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/003. 1.2 Understanding Enterprise Wide Penetration Testing.mp4
    83.96 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/002. 1.1 Introducing Red Teams and Enterprise Hacking.mp4
    65.78 MB
  • Lesson 3 Enterprise Social Engineering/004. 3.3 Exploiting Social Engineering Tools.mp4
    59.94 MB
  • Lesson 2 External and Internal Reconnaissance/003. 2.2 Understanding Passive Recon.mp4
    56.31 MB
  • Lesson 4 Network and Vulnerability Scanning/005. 4.4 Exploring How to Automate Scans.mp4
    53.7 MB
  • Lesson 2 External and Internal Reconnaissance/002. 2.1 Understanding the Red Team Environment.mp4
    52.25 MB
  • Lesson 5 Web App Testing/003. 5.2 Exploring Web App Testing Essential Tools.mp4
    51.53 MB
  • Lesson 3 Enterprise Social Engineering/002. 3.1 Surveying Social Engineering Methodologies.mp4
    47.94 MB
  • Lesson 4 Network and Vulnerability Scanning/007. 4.6 Exploring Vulnerability Scanners.mp4
    46.62 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/006. 1.5 Surveying Operational Processes and Policies for .mp4
    44.58 MB
  • Lesson 9 Cloud Services/002. 9.1 Understanding the Challenge of Testing Cloud Services.mp4
    44.02 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/004. 8.3 Understanding How to Compromise User Credentials.mp4
    40.58 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/005. 1.4 Exploring How to Plan and Fund a Red Team.mp4
    39.06 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/004. 1.3 Understanding the Difference Between Red and Blue.mp4
    33.27 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/007. 8.6 Searching for Sensitive Data.mp4
    32.46 MB
  • Lesson 3 Enterprise Social Engineering/003. 3.2 Understanding How to Target Employees.mp4
    31.86 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/008. 8.7 Understanding Data Exfiltration Techniques.mp4
    31.85 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/008. 1.7 Understanding Red Team Collaboration.mp4
    31.61 MB
  • Lesson 2 External and Internal Reconnaissance/004. 2.3 Understanding Active Recon.mp4
    30.12 MB
  • Lesson 7 Privilege Escalation/002. 7.1 Learning Privilege Escalation Methodologies.mp4
    29.88 MB
  • Lesson 4 Network and Vulnerability Scanning/003. 4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4
    29.32 MB
  • Lesson 4 Network and Vulnerability Scanning/006. 4.5 Using Shodan and Its API.mp4
    28.23 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/007. 1.6 Understanding How to Create and Hire the Red Team.mp4
    28.06 MB
  • Lesson 5 Web App Testing/004. 5.3 Understanding Enterprise Application Continuous Testing.mp4
    27.35 MB
  • Lesson 10 Reporting and Continuous Evaluation/002. 10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4
    27.06 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/009. 8.8 Understanding How to Cover Your Tracks.mp4
    25.74 MB
  • Introduction/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Introduction.mp4
    23.58 MB
  • Lesson 6 Internal Testing/003. 6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4
    23.19 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/003. 8.2 Learning How to Achieve Domain Admin Access.mp4
    22.94 MB
  • Lesson 9 Cloud Services/003. 9.2 Exploring How to Test in the Cloud.mp4
    22.66 MB
  • Lesson 6 Internal Testing/004. 6.3 Exploring the Hidden Cost of Open Source Software.mp4
    21.94 MB
  • Lesson 7 Privilege Escalation/003. 7.2 Understanding Lateral Movement.mp4
    21.26 MB
  • Lesson 6 Internal Testing/005. 6.4 Learning How to Host Enterprise Capture the Flag Events.mp4
    20.01 MB
  • Lesson 4 Network and Vulnerability Scanning/002. 4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4
    18.75 MB
  • Lesson 7 Privilege Escalation/004. 7.3 Surveying Privilege Escalation Essential Tools.mp4
    18.22 MB
  • Lesson 4 Network and Vulnerability Scanning/004. 4.3 Understanding Scanning Tools.mp4
    17.01 MB
  • Summary/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Summary.mp4
    16.24 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/005. 8.4 Surveying Password Cracking and Reporting.mp4
    15.67 MB
  • Lesson 5 Web App Testing/002. 5.1 Exploring How to Target Hosts.mp4
    15.65 MB
  • Lesson 4 Network and Vulnerability Scanning/008. 4.7 Understanding Binary and Source Code Scanners.mp4
    15.22 MB
  • Lesson 4 Network and Vulnerability Scanning/009. 4.8 Understanding How to Perform Continuous Monitoring.mp4
    13.61 MB
  • Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/001. Learning objectives.mp4
    12.61 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/006. 8.5 Understanding That Domain Admin Is Not the End Goal.mp4
    10.04 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/001. Learning objectives.mp4
    9.89 MB
  • Lesson 6 Internal Testing/002. 6.1 Understanding How to Initially Get on the Network.mp4
    9.64 MB
  • Lesson 10 Reporting and Continuous Evaluation/003. 10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4
    8.1 MB
  • Lesson 4 Network and Vulnerability Scanning/001. Learning objectives.mp4
    7.43 MB
  • Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/002. 8.1 Understanding Persistent Access.mp4
    5.99 MB
  • Lesson 7 Privilege Escalation/001. Learning objectives.mp4
    5.4 MB
  • Lesson 2 External and Internal Reconnaissance/001. Learning objectives.mp4
    5.08 MB
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交