UD63/01 Introduction/001 Welcome to the course.mp4 |
75 MB |
UD63/01 Introduction/002 CompTIA-Pentest-Study-Notes.pdf |
2.2 MB |
UD63/01 Introduction/002 Download the Study Guide.html |
1 KB |
UD63/01 Introduction/003 Exam Foundations.mp4 |
87.6 MB |
UD63/02 Domain 1 Planning and Scoping/004 Planning and Scoping (Overview).mp4 |
26.2 MB |
UD63/02 Domain 1 Planning and Scoping/005 Penetration Testing Methodology.mp4 |
60.6 MB |
UD63/02 Domain 1 Planning and Scoping/006 Planning a Penetration Test.mp4 |
152.9 MB |
UD63/02 Domain 1 Planning and Scoping/007 Rules of Engagement.mp4 |
107.7 MB |
UD63/02 Domain 1 Planning and Scoping/008 Legal Concepts.mp4 |
195 MB |
UD63/02 Domain 1 Planning and Scoping/009 Testing Strategies.mp4 |
54.9 MB |
UD63/02 Domain 1 Planning and Scoping/010 White Box Support Resources.mp4 |
119.2 MB |
UD63/02 Domain 1 Planning and Scoping/011 Types of Assessments.mp4 |
106.2 MB |
UD63/02 Domain 1 Planning and Scoping/012 Threat Actors.mp4 |
140.2 MB |
UD63/02 Domain 1 Planning and Scoping/013 Target Selection.mp4 |
101.8 MB |
UD63/02 Domain 1 Planning and Scoping/014 Other Scoping Considerations.mp4 |
129.1 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/015 Information Gathering and Vulnerability Identification (Overview).mp4 |
48.4 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/016 Information Gathering.mp4 |
189.1 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/017 Reconnaissance with CentralOps (Demo).mp4 |
120.5 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/018 Scanning and Enumeration.mp4 |
84.2 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/019 Fingerprinting.mp4 |
78.7 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/020 Scanning and Enumeration (Demo).mp4 |
177.9 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/021 Cryptographic Inspection.mp4 |
28.3 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/022 Eavesdropping.mp4 |
62.4 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/023 Decompiling and Debugging.mp4 |
50.8 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/024 Open Source Research.mp4 |
115.4 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/025 Vulnerability Scanning.mp4 |
169 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/026 Scanning Considerations.mp4 |
104.5 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/027 Application and Container Scans.mp4 |
54.8 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/028 Analyzing Vulnerability Scans.mp4 |
136.7 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/029 Leverage Information for Exploit.mp4 |
63.7 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/030 Common Attack Vectors.mp4 |
122 MB |
UD63/03 Domain 2 Information Gathering and Vulnerability Identification/031 Weaknesses in Specialized Systems.mp4 |
202.5 MB |
UD63/04 Domain 3 Attacks and Exploits/032 Attacks and Exploits (Overview).mp4 |
36.6 MB |
UD63/04 Domain 3 Attacks and Exploits/033 Social Engineering.mp4 |
237.9 MB |
UD63/04 Domain 3 Attacks and Exploits/034 Motivation Factors.mp4 |
138.5 MB |
UD63/04 Domain 3 Attacks and Exploits/035 Physical Security Attacks.mp4 |
104.9 MB |
UD63/04 Domain 3 Attacks and Exploits/036 Lock Picking (Demo).mp4 |
26.8 MB |
UD63/04 Domain 3 Attacks and Exploits/037 Network-based Vulnerabilities.mp4 |
255.2 MB |
UD63/04 Domain 3 Attacks and Exploits/038 Wireless-based Vulnerabilities.mp4 |
160.2 MB |
UD63/04 Domain 3 Attacks and Exploits/039 Wireless Network Attack (Demo).mp4 |
77.3 MB |
UD63/04 Domain 3 Attacks and Exploits/040 Application-based Vulnerabilities.mp4 |
324.4 MB |
UD63/04 Domain 3 Attacks and Exploits/041 Local Host Vulnerabilities.mp4 |
53 MB |
UD63/04 Domain 3 Attacks and Exploits/042 Privilege Escalation (Linux).mp4 |
86.1 MB |
UD63/04 Domain 3 Attacks and Exploits/043 Privilege Escalation (Windows).mp4 |
192.7 MB |
UD63/04 Domain 3 Attacks and Exploits/044 Privilege Escalation.mp4 |
93.8 MB |
UD63/04 Domain 3 Attacks and Exploits/045 Privilege Escalation (Demo).mp4 |
90.9 MB |
UD63/04 Domain 3 Attacks and Exploits/046 Lateral Movement.mp4 |
163.7 MB |
UD63/04 Domain 3 Attacks and Exploits/047 Persistence.mp4 |
125 MB |
UD63/04 Domain 3 Attacks and Exploits/048 Covering Your Tracks.mp4 |
101.6 MB |
UD63/04 Domain 3 Attacks and Exploits/049 Persistence and Covering Tracks (Demo).mp4 |
107.8 MB |
UD63/05 Domain 4 Penetration Testing Tools/050 Penetration Testing Tools (Overview).mp4 |
47.6 MB |
UD63/05 Domain 4 Penetration Testing Tools/051 Nmap Usage.mp4 |
194.8 MB |
UD63/05 Domain 4 Penetration Testing Tools/052 Nmap Usage (Demo).mp4 |
96.1 MB |
UD63/05 Domain 4 Penetration Testing Tools/053 Use Cases for Tools.mp4 |
137.9 MB |
UD63/05 Domain 4 Penetration Testing Tools/054 Scanners.mp4 |
41 MB |
UD63/05 Domain 4 Penetration Testing Tools/055 Credential Testing Tools.mp4 |
121.2 MB |
UD63/05 Domain 4 Penetration Testing Tools/056 Password Cracking (Demo).mp4 |
26.2 MB |
UD63/05 Domain 4 Penetration Testing Tools/057 Debuggers.mp4 |
47 MB |
UD63/05 Domain 4 Penetration Testing Tools/058 Software Assurance.mp4 |
42 MB |
UD63/05 Domain 4 Penetration Testing Tools/059 OSINT.mp4 |
93.2 MB |
UD63/05 Domain 4 Penetration Testing Tools/060 Wireless.mp4 |
33.8 MB |
UD63/05 Domain 4 Penetration Testing Tools/061 Web Proxies.mp4 |
105.9 MB |
UD63/05 Domain 4 Penetration Testing Tools/062 Social Engineering Tools.mp4 |
23 MB |
UD63/05 Domain 4 Penetration Testing Tools/063 Remote Access Tools.mp4 |
93.9 MB |
UD63/05 Domain 4 Penetration Testing Tools/064 Networking Tools.mp4 |
31.2 MB |
UD63/05 Domain 4 Penetration Testing Tools/065 Mobile Tools.mp4 |
41.3 MB |
UD63/05 Domain 4 Penetration Testing Tools/066 Miscellaneous Tools.mp4 |
85.7 MB |
UD63/05 Domain 4 Penetration Testing Tools/067 Intro to Programming.mp4 |
52.3 MB |
UD63/05 Domain 4 Penetration Testing Tools/068 Programming Concepts.mp4 |
405.7 MB |
UD63/05 Domain 4 Penetration Testing Tools/069 BASH Script Example.mp4 |
79.6 MB |
UD63/05 Domain 4 Penetration Testing Tools/069 Bash-Example-Scan-with-Nmap.txt |
3 KB |
UD63/05 Domain 4 Penetration Testing Tools/070 Python Script Example.mp4 |
61 MB |
UD63/05 Domain 4 Penetration Testing Tools/070 Python-Example-Public-IP.txt |
2 KB |
UD63/05 Domain 4 Penetration Testing Tools/071 PowerShell Script Example.mp4 |
56.7 MB |
UD63/05 Domain 4 Penetration Testing Tools/071 PowerShell-Example-Enumerator.txt |
9 KB |
UD63/05 Domain 4 Penetration Testing Tools/072 MS17-010-Exploit-700-lines-of-Ruby.txt |
26 KB |
UD63/05 Domain 4 Penetration Testing Tools/072 Ruby Script Example.mp4 |
81.3 MB |
UD63/05 Domain 4 Penetration Testing Tools/072 Ruby-Example-Banner-Grabber.txt |
773 B |
UD63/06 Domain 5 Reporting and Communication/073 Reporting and Communication (Overview).mp4 |
36.3 MB |
UD63/06 Domain 5 Reporting and Communication/074 Pentest Communications.mp4 |
164.7 MB |
UD63/06 Domain 5 Reporting and Communication/075 Report Writing.mp4 |
150.9 MB |
UD63/06 Domain 5 Reporting and Communication/076 Mitigation Strategies.mp4 |
133 MB |
UD63/06 Domain 5 Reporting and Communication/077 Post-Report Activities.mp4 |
85.6 MB |
UD63/06 Domain 5 Reporting and Communication/078 Pentest Report Example.mp4 |
16.6 MB |
UD63/06 Domain 5 Reporting and Communication/external-assets-links.txt |
189 B |
UD63/07 Conclusion/079 Conclusion.mp4 |
38.3 MB |
UD63/07 Conclusion/080 Creating Your Pentest Lab.mp4 |
154.5 MB |
UD63/07 Conclusion/081 BONUS Where to go from here.mp4 |
59.9 MB |
UD63/07 Conclusion/external-assets-links.txt |
440 B |