Livelessons - Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)
File List
- 11.2.1 Understanding the Red Team Environment.mp4 625.0 MB
- 04.1.2 Understanding Enterprise Wide Penetration Testing.mp4 453.3 MB
- 03.1.1 Introducing Red Teams and Enterprise Hacking.mp4 314.5 MB
- 14.3.1 Surveying Social Engineering Methodologies.mp4 231.2 MB
- 33.6.3 Exploring the Hidden Cost of Open Source Software.mp4 222.6 MB
- 37.7.2 Understanding Lateral Movement.mp4 217.5 MB
- 07.1.5 Surveying Operational Processes and Policies for the Red Team.mp4 212.2 MB
- 49.9.1 Understanding the Challenge of Testing Cloud Services.mp4 210.7 MB
- 21.4.4 Exploring How to Automate Scans.mp4 205.7 MB
- 16.3.3 Exploiting Social Engineering Tools.mp4 192.5 MB
- 06.1.4 Exploring How to Plan and Fund a Red Team.mp4 186.0 MB
- 50.9.2 Exploring How to Test in the Cloud.mp4 181.6 MB
- 34.6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 179.4 MB
- 28.5.2 Exploring Web App Testing Essential Tools.mp4 171.7 MB
- 05.1.3 Understanding the Difference Between Red and Blue Teams.mp4 159.5 MB
- 15.3.2 Understanding How to Target Employees.mp4 156.8 MB
- 09.1.7 Understanding Red Team Collaboration.mp4 150.8 MB
- 23.4.6 Exploring Vulnerability Scanners.mp4 149.2 MB
- 45.8.6 Searching for Sensitive Data.mp4 141.6 MB
- 08.1.6 Understanding How to Create and Hire the Red Team.mp4 136.6 MB
- 12.2.2 Understanding Passive Recon.mp4 135.8 MB
- 01.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Introduction.mp4 132.9 MB
- 42.8.3 Understanding How to Compromise User Credentials.mp4 127.8 MB
- 22.4.5 Using Shodan and Its API.mp4 106.2 MB
- 46.8.7 Understanding Data Exfiltration Techniques.mp4 103.1 MB
- 29.5.3 Understanding Enterprise Application Continuous Testing.mp4 94.7 MB
- 54.Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking - Summary.mp4 92.2 MB
- 19.4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 80.1 MB
- 41.8.2 Learning How to Achieve Domain Admin Access.mp4 79.4 MB
- 47.8.8 Understanding How to Cover Your Tracks.mp4 78.2 MB
- 36.7.1 Learning Privilege Escalation Methodologies.mp4 74.1 MB
- 52.10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 73.7 MB
- 32.6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 70.0 MB
- 18.4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 69.1 MB
- 02.Learning objectives.mp4 67.4 MB
- 38.7.3 Surveying Privilege Escalation Essential Tools.mp4 60.5 MB
- 39.Learning objectives.mp4 55.3 MB
- 43.8.4 Surveying Password Cracking & Reporting.mp4 48.0 MB
- 24.4.7 Understanding Binary and Source Code Scanners.mp4 46.1 MB
- 20.4.3 Understanding Scanning Tools.mp4 45.5 MB
- 17.Learning objectives.mp4 40.4 MB
- 27.5.1 Exploring How to Target Hosts.mp4 40.0 MB
- 25.4.8 Understanding How to Perform Continuous Monitoring.mp4 39.4 MB
- 44.8.5 Understanding That Domain Admin Is Not the End Goal.mp4 36.5 MB
- 35.Learning objectives.mp4 31.6 MB
- 10.Learning objectives.mp4 31.1 MB
- 26.Learning objectives.mp4 29.4 MB
- 53.10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 29.0 MB
- 31.6.1 Understanding How to Initially Get on the Network.mp4 27.5 MB
- 48.Learning objectives.mp4 26.0 MB
- 51.Learning objectives.mp4 24.8 MB
- 13.Learning objectives.mp4 24.1 MB
- 30.Learning objectives.mp4 21.3 MB
- 40.8.1 Understanding Persistent Access.mp4 15.6 MB
- fkSJH.jpg 25.5 KB
- info.txt 6.1 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.